<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Columns and Editorials Archives - Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<atom:link href="https://insidegnss.com/category/columns-and-editorials/feed/" rel="self" type="application/rss+xml" />
	<link>https://insidegnss.com/category/columns-and-editorials/</link>
	<description>Global Navigation Satellite Systems Engineering, Policy, and Design</description>
	<lastBuildDate>Fri, 13 Mar 2026 20:17:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://insidegnss.com/wp-content/uploads/2017/12/site-icon.png</url>
	<title>Columns and Editorials Archives - Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</title>
	<link>https://insidegnss.com/category/columns-and-editorials/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Working Papers: Overview of Overbounding Techniques for Integrity Purposes</title>
		<link>https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Wed, 04 Mar 2026 02:18:28 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196409</guid>

					<description><![CDATA[<p>A comprehensive look at various concepts related to CDF-overbounding, and a methodology for creating protection volumes that contain positioning errors with a high...</p>
<p>The post <a href="https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/">Working Papers: Overview of Overbounding Techniques for Integrity Purposes</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>A comprehensive look at various concepts related to CDF-overbounding, and a methodology for creating protection volumes that contain positioning errors with a high level of confidence.</em></p>



<span id="more-196409"></span>



<p><strong>SÉBASTIEN TRILLES, ODILE MALIET, JULIE ANTIC, KIN MIMOUNI</strong>, THALES ALENIA SPACE, FRANCE</p>



<p>In a broad sense, the notion of integrity refers to the level of confidence one can have in data obtained from a calculation result. In positioning systems, integrity is a measure of the trustworthiness a user can place in a position estimate. Geolocation would be perfect if measurements were error-free, but this is never the case as all device measurements inherently contain errors and noise. Hence, a discrepancy between the calculated position and the true (but unknown) one always exists. As errors and noise contains stochastic part, integrity is fundamentally grounded in probabilistic theory.</p>



<p>Mathematically expressed, integrity is equivalent to assigning a probability of the estimate being outside a defined confidence interval (protection level). The integrity of a positioning system is compromised when anomalies occur, leading to unexpected positioning errors beyond the operational protection level. These anomalies could persist for more than a few seconds within a specific time interval (T). In such cases, the integrity risk (IR) is defined as the probability the true position remains outside the protection level for a duration exceeding T.</p>



<p>For instance, in precision approach operations in aviation, the Standards And Recommended Practices (SARPs) set the IR at 2×10<sup>-7</sup>&nbsp;per approach (150s) and the specific time interval to&nbsp;T=6s. The computation of Protection Level (PL) consists of scaling position error variance to the integrity requirement using K-factors. The K-factors are derived from statistical laws and are critical for ensuring the system’s integrity in various operational conditions, taking into account the errors&#8217; time-correlation [9] [10].</p>



<p>In practical applications, positioning is accomplished using measurements with well-known residual error structure and statistical distributions. Position and time errors are determined by linearly combining the residual errors of the measurements. The process starts with the GNSS navigation solution involving the estimation of a position-time correction x as a solution to the measurement equations linearized around a given position-time priori:&nbsp;<em>WGx=Wb+</em>ε, where&nbsp;<em>G</em>&nbsp;is a&nbsp;<em>m×4</em>&nbsp;matrix with&nbsp;<em>m</em>&nbsp;the number of line of sight,&nbsp;ε&nbsp;is the measurement noises vector,&nbsp;<em>W</em>&nbsp;is a weight matrix and&nbsp;<em>b</em>&nbsp;is the residual measurements vector. The noises&nbsp;ε&nbsp;are assumed to follow a Normal centered law.</p>



<p>The so called design matrix&nbsp;<em>G</em>&nbsp;is defined as the matrix of partial derivatives of the measurement equations with respect to the parameters of position and time. The partial derivative of the pseudo range with respect to the position correction is obtained from the partial derivatives of the geometric distance D=||X<sup>s</sup>-X<sub>r</sub>&nbsp;||&nbsp;between satellite position&nbsp;<em>X</em><em><sup>s</sup></em>&nbsp;and (unknown) receiver position&nbsp;<em>X</em><em><sub>r</sub></em><em>.&nbsp;</em>Re-writing the geometric distance as&nbsp;<em>D=u</em><em><sub>r</sub></em><em><sup>s</sup></em><em>∙(X</em><em><sup>s</sup></em><em>-X</em><em><sub>r</sub></em><em>),</em>&nbsp;the partial derivative of with respect to the positions is the unit vector of the line of sight–<em>u</em><em><sub>r</sub></em><em><sup>s</sup></em>&nbsp;from receiver to satellite.</p>



<p>The weights per line of sight are built using different model variances related to various contributor to measurement errors: residual system errors (orbit and clock), propagation errors (ionosphere and troposphere), and local errors (multipath, thermal noise and interference). The maximum likelihood method provides the estimate&nbsp;<em>=Sb,</em>&nbsp;where&nbsp;<em>S=(G</em><em><sup>t</sup></em><em>&nbsp;W G)</em><em><sup>-1</sup></em><em>G</em><em><sup>t</sup></em><em>&nbsp;W</em>&nbsp;is the&nbsp;<em>4×m</em>&nbsp;sensitivity matrix expressed in the east (E), north (N), up (U) local frame and time.</p>



<p>The estimation positioning error <em>e</em> is given by </p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="476" height="58" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM.png" alt="Screen Shot 2026-03-03 at 4.36.01 PM" class="wp-image-196410" style="width:213px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM.png 476w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.36.01-PM-48x6.png 48w" sizes="(max-width: 476px) 100vw, 476px" /></figure>



<p>The first three row components of <em>S, </em>respectively s<sub>E,i</sub>, s<sub>N,i</sub> and s<sub>U,i</sub> correspond to the partial derivatives of position errors with respect to the east, north and up directions in relation to the measurement errors of the i-th satellite. The sensitivity matrix linearly projects the unmodeled residual measurement errors ε<em><sub>i</sub></em> in a given direction.</p>



<p>For east direction:</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="308" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM.png" alt="Screen Shot 2026-03-03 at 4.38.20 PM" class="wp-image-196412" style="aspect-ratio:3.2093023255813953;width:103px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM.png 308w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.38.20-PM-48x15.png 48w" sizes="(max-width: 308px) 100vw, 308px" /></figure>



<p>for north:</p>



<figure class="wp-block-image size-full is-resized"><img decoding="async" width="314" height="98" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM.png" alt="Screen Shot 2026-03-03 at 4.41.12 PM" class="wp-image-196413" style="aspect-ratio:3.2041793643883327;width:103px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM.png 314w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.41.12-PM-48x15.png 48w" sizes="(max-width: 314px) 100vw, 314px" /></figure>



<p>and for up:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="314" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM.png" alt="Screen Shot 2026-03-03 at 4.43.05 PM" class="wp-image-196414" style="width:105px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM.png 314w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-300x92.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.43.05-PM-48x15.png 48w" sizes="auto, (max-width: 314px) 100vw, 314px" /></figure>



<p>This process establishes a straightforward mathematical transfer that enables the projection of residual errors from the measurement domain to the position domain. Focusing on measurement domain, we seek sufficient properties regarding measurement errors distribution that ensure integrity in the domain of positions. These properties define integrity at the measurement level. If these properties are respected, integrity in the domain of positions is ensured, referred to as the transfer of integrity from the measurement domain to the position domain.</p>



<p>This article provides a comprehensive overview of the various concepts related to CDF overbounding. It aims to articulate each concept within a common framework, delineate their ranges and limitations, and ultimately present a methodology for creating protection volumes that reliably contain positioning errors with a high level of confidence.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="360" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-1024x360.png" alt="Screenshot 2026-02-11 at 5.39.02 PM" class="wp-image-196522" style="width:600px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-1024x360.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-300x105.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-768x270.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM-48x17.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.02-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-mops-integrity-concept">MOPS Integrity Concept </h3>



<p>Initially, integrity concept was developed for aeronautical users and standardized by the Minimum Operational Performance Standards (MOPS) document [1] and is defined at position level. This standard deals with integrity parameters broadcasted by SBAS regarding ionosphere, orbit and clock corrections. In this aspect, MOPS considers the individual measurement error contributors as independent, making it possible to sum up all model variances in unique one σ<em><sub>i</sub></em><sup>2</sup>&nbsp;per line of sight. The weight matrix is defined as diagonal&nbsp;<em>W</em>=diag(w<sub>1</sub>,…,w<sub>m</sub>) where&nbsp;<em>w</em><em><sub>i</sub></em>=1⁄σ<sub>i</sub><sup>2</sup>).</p>



<p>Therefore, the measurement errors are assumed of white noise type, so their distributions have a zero expectation&nbsp;<em>E</em>[ε]=0, which implies the expectation of the identification error is also zero:&nbsp;<em>E</em>[<em>e</em>]=<em>SE</em>[ε]=0.</p>



<p>The covariance of the error is: cov(<em>e</em>)=<em>E</em>[(<em>e-E</em>[<em>e</em>]) (<em>e-E</em>[<em>e</em>])<sup>t</sup>]=<em>E</em>[<em>ee<sup>t</sup></em>]<em>SE</em>[εε<sup>t</sup>] <em>S<sup>t</sup></em>=<em>Scov</em>(ε)<em>S<sup>t</sup>.</em> Therefore, the minimum covariance is reached by taking cov(ε)=<em>W</em><sup>-1</sup>, thus cov(<em>e</em>)=<em>SW</em><sup>-1</sup><em>S<sup>t</sup></em>=(<em>G<sup>t</sup></em> <em>WG</em>)<sup>-1</sup>. This refers to a four-dimensional symmetric positive-definite matrix whose are linear combinations of the measurement variances, as for instance:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="270" height="106" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM.png" alt="Screen Shot 2026-03-03 at 4.47.09 PM" class="wp-image-196415" style="width:176px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM.png 270w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-36x14.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.47.09-PM-48x19.png 48w" sizes="auto, (max-width: 270px) 100vw, 270px" /></figure>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="948" height="118" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM.png" alt="Screen Shot 2026-03-03 at 4.51.09 PM" class="wp-image-196417" style="aspect-ratio:8.03467344193693;width:418px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM.png 948w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-768x96.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-4.51.09-PM-48x6.png 48w" sizes="auto, (max-width: 948px) 100vw, 948px" /></figure>



<p>The positioning error structure is then separated into horizontal errors <em>e<sub>H</sub></em> and vertical errors <em>e<sub>U</sub>,</em> which amounts to considering the following extracted submatrices:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="46" src="https://insidegnss.com/wp-content/uploads/2026/03/10.png" alt="10" class="wp-image-196418" srcset="https://insidegnss.com/wp-content/uploads/2026/03/10.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/10-300x43.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/10-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/10-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/10-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>The MOPS specify the integrity risk IR as the maximum allowable probability for the navigation position error to exceed the alarm limit without the system alerting the user within the alert time. In the case of a standardized Normal distribution, such as <em>N</em>(0,1), the <em>K</em>-factor depends on the risk <em>IR:</em></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="38" src="https://insidegnss.com/wp-content/uploads/2026/03/11.png" alt="11" class="wp-image-196419" srcset="https://insidegnss.com/wp-content/uploads/2026/03/11.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/11-300x36.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/11-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/11-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/11-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>By making the change of variables <em>t</em>=√2<em>u</em> in <strong>Equation 2,</strong> we obtain an expression that depends on the complementary error function erfc:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/12.png" alt="12" class="wp-image-196420" srcset="https://insidegnss.com/wp-content/uploads/2026/03/12.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/12-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/12-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/12-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/12-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>and after inversion in <strong>Equation 3, </strong>we get the expression of the usual Gaussian <em>K</em>-factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/13.png" alt="13" class="wp-image-196421" srcset="https://insidegnss.com/wp-content/uploads/2026/03/13.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/13-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/13-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/13-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/13-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Application to protection volumes: </strong>The MOPS standard define the vertical protection volume as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/14.png" alt="14" class="wp-image-196422" srcset="https://insidegnss.com/wp-content/uploads/2026/03/14.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/14-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/14-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/14-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/14-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Where the K-factor inflates the standard deviation <em>d<sub>U</sub></em> at a level compatible with integrity requirements. Because a linear combination of Gaussian-distributed vector is Gaussian-distributed, the residual position errors follow a Normal law. If Φ<sub>eU</sub> denotes the cumulative distribution function (CDF) of this Normal law, defined by Φ<sub>eU</sub>(x)=<em>P</em>(<em>e<sub>U</sub></em>≤<em>x</em>), we then have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/15.png" alt="15" class="wp-image-196423" srcset="https://insidegnss.com/wp-content/uploads/2026/03/15.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/15-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/15-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/15-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/15-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Equation 6</strong>&nbsp;indicates that the absolute value of the error&nbsp;<em>e</em><em><sub>U</sub></em>&nbsp;is bounded by the confidence interval&nbsp;<em>VPL</em>&nbsp;defined in&nbsp;<strong>Equation 5</strong>&nbsp;at the probability (1-<em>IR</em>).</p>



<p>The integrity MOPS concept does not mention any overbounding approach. It does not provide information regarding the shape of empirical residual errors distribution. It only mentions [1] the necessity from SBAS to broadcast two parameters, the first one being the variance of Normal distributions associated with the user differential range error for a satellite after application of corrections, and the second one associated with residual ionosphere vertical error at an ionospheric grid point for an L1 signal. The term “associated” as used by MOPS leaves room for several possible interpretations.</p>



<p>In fact, these definitions may give the impression that these Normal distributions represent the actual errors distribution. This interpretation has already been mentioned by several authors [5]. As a consequence, based on the stability of independent Normal distributions through linear combination, the position errors distribution is also represented by a Normal distribution. Unfortunately, the actual range errors are generally not Normal, especially in the tails.</p>



<p>In that context, it could be tempting to check integrity at the pseudorange level by making sure that, for all lines of sight&nbsp;<em>i,</em>&nbsp;the Normal distribution with standard deviation σ<em><sub>i</sub></em>&nbsp;is conservative at the quantile equals to the integrity risk IR:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/16.png" alt="16" class="wp-image-196424" srcset="https://insidegnss.com/wp-content/uploads/2026/03/16.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/16-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/16-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/16-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/16-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Non-intuitively, this naïve approach is not correct in general conditions. Annex A3 in [1] shows a toy example that satisfies&nbsp;<strong>Equation 7</strong>&nbsp;for all lines of sight, and yet is not compliant with the integrity risk IR on position. This example clearly shows integrity transfer from range to position is not obvious and explains the emergence of overbounding concepts.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="358" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-1024x358.png" alt="Screenshot 2026-02-11 at 5.39.13 PM" class="wp-image-196523" style="width:595px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-1024x358.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-300x105.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-768x268.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM-48x17.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.13-PM.png 1162w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-cdf-overbounding">CDF-Overbounding </h3>



<p>The CDF-overbounding concept has been introduced by [2] in the field of aeronautical users. The main idea is to overbound the empirical measurement error distribution, in the field of CDF, by a simpler one allowing to better control the integrity risk mainly in the tails, in the absence of faults. An overbound can be viewed as a statistic distribution that is a regular envelope of the empirical distribution. It is interesting to note the mathematical results presented in [2] were already known to the statistic community [14].</p>



<p>In the following, the CDF of a random variable X is denoted by&nbsp;<em>F</em><em><sub>X</sub></em><em>.</em>&nbsp;According to [2], the random variable&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is a CDF-overbound of the random variable&nbsp;<em>X,&nbsp;</em>and we note&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/049e9722-dc98-4a5f-8f7a-7bae4e1dab7d" alt=""><em>O</em><em><sub>X</sub></em>, if</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/18.png" alt="18" class="wp-image-196425" srcset="https://insidegnss.com/wp-content/uploads/2026/03/18.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/18-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/18-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/18-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/18-48x7.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The binary relationship (8) defines a partial order on the set of distributions. Indeed, the CDF-overbound relation is:</p>



<p>•&nbsp;<strong>Reflexive:</strong>&nbsp;X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">X<br>(every element is related to itself)</p>



<p>•&nbsp;<strong>Transitive:</strong>&nbsp;if X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Y and Y<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Z then X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Z<br>(the order is maintained through the chain)</p>



<p>•&nbsp;<strong>Antisymmetric:</strong>&nbsp;if X<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">Y and<br>Y<img decoding="async" src="blob:https://insidegnss.com/fed69565-4bdf-4c55-af7b-f4d76512f921" alt="">X then X=Y (two elements can&#8217;t mutually precede each other; they are considered equal)</p>



<p>Three graphical representations of CDF-overbounding are provided in&nbsp;<strong>Figure 1</strong>&nbsp;for a Gaussian overbound with standard deviation equals to 0.7. The green area represents the domain for the CDF (respectively folded CDF and QQ plot) of&nbsp;<em>X,</em>&nbsp;that satisfies the CDF-overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>O</em><em><sub>X</sub></em><em>.</em>&nbsp;On the left, the CDF of the overbound&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is represented in black. This representation is a direct illustration of the definition. The representation in the middle is based on the folded CDF that equals the CDF before the median and the survival function (1-CDF) after the median. This representation is handy to inspect the overbounding on the left and right tails thanks to the log-scale. The representation on the left is based on the Quantile-Quantile (QQ) plot for&nbsp;<em>X</em>&nbsp;and&nbsp;<em>O</em><em><sub>X</sub></em>. It permits inspecting both the core and the tails of the distribution.</p>



<p>Introducing the overbounding concept allows the following result:&nbsp;</p>



<p><strong>Theorem 1:</strong>&nbsp;If&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;are two centered symmetric and unimodal distributions, and&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>O</em><em><sub>Y</sub></em>&nbsp;their respective overbounds are also symmetric and unimodal. Then for all α, β in&nbsp;<img decoding="async" src="blob:https://insidegnss.com/a050764f-bd2b-4772-87d8-2af9857cd8e7" alt="">, the linear combination α<em>X</em>+β<em>Y</em>&nbsp;is CDF-overbounded by α<em>O</em><em><sub>X</sub></em>+β<em>O</em><em><sub>Y</sub></em>. In short, the overbounding property is stable by linear combination:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="14" src="https://insidegnss.com/wp-content/uploads/2026/03/26.png" alt="26" class="wp-image-196426" srcset="https://insidegnss.com/wp-content/uploads/2026/03/26.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/26-300x13.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/26-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/26-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/26-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If the distribution of each residual measurement error is symmetric, unimodal and can be overbounded by a distribution that is also symmetric and unimodal, then the positioning errors are also overbounded by a known symmetric and unimodal distribution. Under this assumption, integrity in the pseudorange domain implies integrity in the position domain.</p>



<h3 class="wp-block-heading" id="h-proof">Proof:</h3>



<p>Proof of stability by addition:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="814" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM.png" alt="Screen Shot 2026-03-03 at 5.01.31 PM" class="wp-image-196427" style="aspect-ratio:8.660223048327138;width:251px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM.png 814w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-768x89.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.01.31-PM-48x6.png 48w" sizes="auto, (max-width: 814px) 100vw, 814px" /></figure>



<p>The proof is established in two steps. The first step is to prove that if </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="678" height="144" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM.png" alt="Screen Shot 2026-03-03 at 5.02.50 PM" class="wp-image-196428" style="aspect-ratio:4.709393014581214;width:198px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM.png 678w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-300x64.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.02.50-PM-48x10.png 48w" sizes="auto, (max-width: 678px) 100vw, 678px" /></figure>



<p>The second step is a direct application of the previous statement: if</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="454" height="76" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM.png" alt="Screen Shot 2026-03-03 at 5.03.51 PM" class="wp-image-196429" style="width:215px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM.png 454w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-300x50.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-5.03.51-PM-48x8.png 48w" sizes="auto, (max-width: 454px) 100vw, 454px" /></figure>



<p>The sum of two independent symmetric and unimodal variables is itself symmetric and unimodal. The proof is detailed in the Appendix (see online version). This shows all the considered distributions have the right properties to be compared by CDF-overbounding.</p>



<p>Applying the definition of CDF-overbounding, proving (1) comes down to establishing that:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="24" src="https://insidegnss.com/wp-content/uploads/2026/03/34.png" alt="34" class="wp-image-196430" srcset="https://insidegnss.com/wp-content/uploads/2026/03/34.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/34-300x23.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/34-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/34-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/34-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="25" src="https://insidegnss.com/wp-content/uploads/2026/03/35.png" alt="35" class="wp-image-196431" srcset="https://insidegnss.com/wp-content/uploads/2026/03/35.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/35-300x24.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/35-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/35-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/35-48x4.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Let us fix z and compute F<sub>X+OY</sub>(z)–F<sub>X+Y</sub>(z) using the formula for the CDF of the sum of two independent random variables (the derivation of the formula is recalled in the Appendix):</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="55" src="https://insidegnss.com/wp-content/uploads/2026/03/36.png" alt="36" class="wp-image-196433" srcset="https://insidegnss.com/wp-content/uploads/2026/03/36.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/36-300x52.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/36-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/36-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/36-48x8.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>We now split the integral of <strong>Equation 10</strong> into two parts and make the change of variable x to <em>-x</em> for the negative part:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="45" src="https://insidegnss.com/wp-content/uploads/2026/03/37.png" alt="37" class="wp-image-196434" srcset="https://insidegnss.com/wp-content/uploads/2026/03/37.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/37-300x42.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/37-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/37-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/37-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>Recalling that by requirement of the CDF-overbounding both <em>Y</em> and <em>O<sub>Y</sub></em> distributions are symmetrical, which means <em>F<sub>Y</sub></em>(<em>-x</em>)=1-<em>F<sub>Y</sub></em>(<em>x</em>) and thus F<sub>OY</sub>(<em>-x</em>)-<em>F<sub>Y</sub></em>(<em>-x</em>)=<em>F<sub>Y</sub></em>(<em>x</em>)-F<sub>OY</sub>(<em>x</em>). <strong>Equation 11</strong> becomes:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/38.png" alt="38" class="wp-image-196435" srcset="https://insidegnss.com/wp-content/uploads/2026/03/38.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/38-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/38-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/38-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/38-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>By definition of </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="146" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM.png" alt="Screen Shot 2026-03-03 at 7.11.08 PM" class="wp-image-196436" style="aspect-ratio:1.5533980582524272;width:47px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM.png 146w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.11.08-PM-48x31.png 48w" sizes="auto, (max-width: 146px) 100vw, 146px" /></figure>



<p>the right parenthesis of the integrand in&nbsp;<strong>Equation 12</strong>&nbsp;is positive for all&nbsp;<em>x.&nbsp;</em>Because&nbsp;<em>X</em>&nbsp;is unimodal and symmetric by assumption, its PDF&nbsp;<em>f</em><em><sub>X</sub></em>&nbsp;peaks at&nbsp;<em>f</em><em><sub>X</sub></em>(0) and is decreasing on the positive and negative sides. Thus, the unimodality and symmetry implies that, for all&nbsp;<em>x</em><sub>1</sub>&nbsp;and&nbsp;<em>x</em><sub>2</sub>, if |<em>x</em><sub>1</sub>|≤|<em>x</em><sub>2</sub>| then&nbsp;<em>f</em><em><sub>X</sub></em>(<em>x</em><sub>1</sub>)≥<em>f</em><em><sub>X</sub></em>(<em>x</em><sub>2</sub>).&nbsp;</p>



<p>In our case of interest, if&nbsp;<em>z</em>&nbsp;is negative, we have for all positive x, |z+x|≤|z-x| and so&nbsp;<em>f</em><em><sub>X</sub></em>(z+x)≥&nbsp;<em>f</em><em><sub>X</sub></em>(z-x), which means the left parenthesis of the previous integrand is also positive. We can deduce that</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="21" src="https://insidegnss.com/wp-content/uploads/2026/03/40.png" alt="40" class="wp-image-196437" srcset="https://insidegnss.com/wp-content/uploads/2026/03/40.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/40-300x20.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/40-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/40-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/40-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>which is precisely the statement (A). On the other hand, if <em>z</em> is positive, |z+x|≥ |z-x| and so <em>f<sub>X</sub></em>(z+x)≤<em>f<sub>X</sub></em>(z-x) meaning that the integrand is negative and so</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/41.png" alt="41" class="wp-image-196438" srcset="https://insidegnss.com/wp-content/uploads/2026/03/41.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/41-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/41-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/41-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/41-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>This proves (B) completing the proof that, if </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="140" height="114" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM.png" alt="Screen Shot 2026-03-03 at 7.14.03 PM" class="wp-image-196439" style="aspect-ratio:1.2283587935761848;width:39px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM.png 140w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-24x20.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-36x29.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.14.03-PM-48x39.png 48w" sizes="auto, (max-width: 140px) 100vw, 140px" /></figure>



<p>and the distributions <em>X, Y, O<sub>Y</sub></em> are symmetric unimodal, then</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="298" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM.png" alt="Screen Shot 2026-03-03 at 7.15.06 PM" class="wp-image-196440" style="width:86px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM.png 298w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.15.06-PM-48x16.png 48w" sizes="auto, (max-width: 298px) 100vw, 298px" /></figure>



<p>By applying the same reasoning, we get that if</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="94" height="80" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM.png" alt="Screen Shot 2026-03-03 at 7.16.05 PM" class="wp-image-196441" style="width:48px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM.png 94w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-24x20.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-36x31.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.16.05-PM-48x41.png 48w" sizes="auto, (max-width: 94px) 100vw, 94px" /></figure>



<p>and the distributions <em>X, O<sub>X</sub>, O<sub>Y</sub></em> are symmetric unimodal, then</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="268" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM.png" alt="Screen Shot 2026-03-03 at 7.17.52 PM" class="wp-image-196442" style="width:101px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM.png 268w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.17.52-PM-48x17.png 48w" sizes="auto, (max-width: 268px) 100vw, 268px" /></figure>



<p>This finishes the proof of stability of CDF-overbounding by addition.</p>



<p><em>Proof of stability by multiplication by a scalar:</em>&nbsp;for all real α,</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="438" height="74" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM.png" alt="Screen Shot 2026-03-03 at 7.19.09 PM" class="wp-image-196443" style="aspect-ratio:5.920997920997921;width:166px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM.png 438w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-300x51.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.19.09-PM-48x8.png 48w" sizes="auto, (max-width: 438px) 100vw, 438px" /></figure>



<p>Let <em>X,</em> <em>O<sub>X</sub></em> be two symmetric, unimodal random variables such that</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="118" height="58" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM.png" alt="Screen Shot 2026-03-03 at 7.21.10 PM" class="wp-image-196445" style="width:45px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM.png 118w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.21.10-PM-48x24.png 48w" sizes="auto, (max-width: 118px) 100vw, 118px" /></figure>



<p>First of all, α<em>X</em>&nbsp;and α<em>O</em><em><sub>X</sub></em>&nbsp;are also symmetric and unimodal. By symmetry of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>O</em><em><sub>X</sub></em><em>,</em>&nbsp;we can restrict ourselves to the case where α is strictly positive. According to the equality&nbsp;<em>F</em><sub>α</sub><em><sub>X</sub></em>(<em>x</em>)=<em>F</em><em><sub>X</sub></em>(<em>x</em>⁄α) and similarly for&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;so the inequalities defining&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/b753ea9a-1e39-4dca-8005-4dfe6fc9627c" alt=""><em>O</em><em><sub>X</sub></em>&nbsp;directly translate to α<em>X</em><img decoding="async" src="blob:https://insidegnss.com/b753ea9a-1e39-4dca-8005-4dfe6fc9627c" alt="">α<em>O</em><em><sub>X</sub></em><em>.</em></p>



<p>Application to protection volumes: If&nbsp;<em>X</em>&nbsp;is the distribution of the residual error (symmetric and unimodal by assumption), then a CDF-overbound&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;allows us to put a lower bound on the probability of the error to be in a certain interval containing 0. More specifically, for a negative&nbsp;<em>a</em>&nbsp;and positive&nbsp;<em>b,</em>&nbsp;we have:&nbsp;<em></em>.&nbsp;</p>



<p>Usually, protection volumes are chosen to be symmetric, and thus for positive&nbsp;<em>a,</em></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/52.png" alt="52" class="wp-image-196446" srcset="https://insidegnss.com/wp-content/uploads/2026/03/52.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/52-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/52-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/52-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/52-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>and so any protection volume computed with the overbounding distribution is a conservative protection volume for the original distribution.</p>



<p>In practice,&nbsp;<em>O</em><em><sub>X</sub></em>&nbsp;is a Gaussian distribution, chosen for its stability by linear combinations. If in the total error</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="94" height="24" src="https://insidegnss.com/wp-content/uploads/2026/03/54.png" alt="54" class="wp-image-196447" srcset="https://insidegnss.com/wp-content/uploads/2026/03/54.png 94w, https://insidegnss.com/wp-content/uploads/2026/03/54-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/54-36x9.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/54-48x12.png 48w" sizes="auto, (max-width: 94px) 100vw, 94px" /></figure>



<p>each error component ε<em><sub>i</sub></em> is CDF-overbounded by a Gaussian distribution with standard deviation σ<em><sub>i</sub>,</em> then the total error <em>e</em> is CDF-overbounded by a Gaussian of standard deviation</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="238" height="102" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM.png" alt="Screen Shot 2026-03-03 at 7.27.25 PM" class="wp-image-196448" style="width:117px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM.png 238w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.27.25-PM-48x21.png 48w" sizes="auto, (max-width: 238px) 100vw, 238px" /></figure>



<p>Thus, the usual formula for the protection . Thus, the usual formula for the protection level can be used, with</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="19" src="https://insidegnss.com/wp-content/uploads/2026/03/55.png" alt="55" class="wp-image-196449" srcset="https://insidegnss.com/wp-content/uploads/2026/03/55.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/55-300x18.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/55-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/55-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/55-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p><strong>Case of distributions with bias:</strong>&nbsp;The CDF-overbound theorem requires the distributions of error components to be centered. However, the absence of bias in residual measurement errors is never perfectly satisfied because of systematic errors due to troposphere, multipath inter-channel bias, etc.</p>



<p>These errors along the lines of sight are therefore composed of a random part, a noise&nbsp;ε<em><sub>i</sub></em>&nbsp;with zero mean, plus an additional bias μ<em><sub>i</sub></em><em>.</em>&nbsp;If these biases were known, they would be integrated into the SBAS corrections, but this is not the case. However, we will assume we know a bound on their absolute values.</p>



<p>The absolute value of the position error along one coordinate is then given by:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/56.png" alt="56" class="wp-image-196450" srcset="https://insidegnss.com/wp-content/uploads/2026/03/56.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/56-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/56-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/56-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/56-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>We can build the protection volume that covers the suffered errors as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="44" src="https://insidegnss.com/wp-content/uploads/2026/03/57.png" alt="57" class="wp-image-196451" srcset="https://insidegnss.com/wp-content/uploads/2026/03/57.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/57-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/57-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/57-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/57-48x7.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>where the factor <em>K</em> is computed according to the error distribution. In the Gaussian case, the multiplicative factor K is calculated using the inverse of the complementary function K=√2<em>erfc</em><sup>-1</sup>(<em>IR</em>).</p>



<p>The question of introducing biases as a multiplicative factor of the protection volume calculated with the classic formulation arises. To do this, we introduce the following calculation:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="322" height="75" src="https://insidegnss.com/wp-content/uploads/2026/03/58.png" alt="58" class="wp-image-196452" srcset="https://insidegnss.com/wp-content/uploads/2026/03/58.png 322w, https://insidegnss.com/wp-content/uploads/2026/03/58-300x70.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/58-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/58-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/58-48x11.png 48w" sizes="auto, (max-width: 322px) 100vw, 322px" /></figure>



<p>Here, the quantities</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/61.png" alt="61" class="wp-image-196453" srcset="https://insidegnss.com/wp-content/uploads/2026/03/61.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/61-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/61-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/61-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/61-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>We then find the desired multiplicative factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="33" src="https://insidegnss.com/wp-content/uploads/2026/03/62.png" alt="62" class="wp-image-196454" srcset="https://insidegnss.com/wp-content/uploads/2026/03/62.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/62-300x31.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/62-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/62-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/62-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>This multiplicative factor ξ makes it possible to inflate the classic volumes of protections (expressed without bias) so as to encompass these residual biases:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/63.png" alt="63" class="wp-image-196455" srcset="https://insidegnss.com/wp-content/uploads/2026/03/63.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/63-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/63-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/63-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/63-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>This approach allows us to state the following result:</p>



<p><strong>Theorem 1bis:</strong>&nbsp;If the distribution of each of the residual measurement errors is symmetric around its median, unimodal and can be overbounded by a Gaussian distribution with the same median (i.e. the mean of the Gaussian is equal to the median of the residual error distribution), then the protection level for the position error can be computed with the usual formula, provided we inflate the<em>&nbsp;K-</em>factor by the multiplicative factor ξ. Under these assumptions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>The definition of coverage relative to a median is given by:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/64.png" alt="64" class="wp-image-196456" srcset="https://insidegnss.com/wp-content/uploads/2026/03/64.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/64-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/64-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/64-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/64-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The concept of CDF-overbound requires the tails of the overbound cover the tails of the empirical distribution. In the case of a Gaussian overbound, we know the tails of the Gaussian distributions are very light and we will end up finding a quantile (even if it is very large) beyond which the tail of the Gaussian passes below the tail of the empirical distribution. This is why we set in practice a quantile <em>q,</em> beyond the specified integrity risk <em>q</em>><em>F</em><sup>-1</sup>(<em>IR⁄2N</em>), within which, on the interval [<em>-q,q</em>], the overbound property is verified.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="388" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-1024x388.png" alt="Screenshot 2026-02-11 at 5.39.26 PM" class="wp-image-196524" style="width:602px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-1024x388.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-300x114.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-768x291.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-36x14.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM-48x18.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.26-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-paired-overbounding">Paired Overbounding </h3>



<p>This concept was introduced in [3,4] to relax the strong assumptions of CDF-overbounding, namely that the distributions of the residual error components are centered, unimodal and symmetric.</p>



<p><strong>Definition:</strong>&nbsp;The random variables&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;are a paired overbound of the random variable&nbsp;<em>X,</em>&nbsp;and we note&nbsp;<em>X</em>&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em><em>, R</em><em><sub>X</sub></em>] if&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/65.png" alt="65" class="wp-image-196457" srcset="https://insidegnss.com/wp-content/uploads/2026/03/65.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/65-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/65-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/65-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/65-48x7.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The random variable&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;is said to be the left overbound and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;is said to be the right overbound of the random variable&nbsp;<em>X.</em>&nbsp;<strong>Figure 2</strong>&nbsp;displays three representations of paired overbounding by two Gaussian distributions with standard deviation 0.7 and bias equals to -/+ 0.3, adopting the same conventions as in&nbsp;<strong>Figure 1.&nbsp;</strong></p>



<p><strong>Theorem 2a:</strong><strong>&nbsp;</strong>For independent random variables&nbsp;<em>X,Y,</em>&nbsp;if X&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and Y&nbsp;⊆&nbsp;[<em>L</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;<em>X</em>+<em>Y</em>&nbsp;⊆&nbsp;[<em>L</em><em><sub>X</sub></em>+<em>L</em><em><sub>Y</sub></em>,<em>R</em><em><sub>X</sub></em>+<em>R</em><em><sub>Y</sub></em>]. In other words, the pair overbounding concept is stable by convolution. A priori the random variables&nbsp;<em>X,Y</em>&nbsp;and their overbounding pair are arbitrary; no particular assumption is necessary to demonstrate stability by convolution, which is the strength of the concept.</p>



<h3 class="wp-block-heading" id="h-proof-0">Proof:</h3>



<p>We have, using the definition of the left-overbounding:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="32" src="https://insidegnss.com/wp-content/uploads/2026/03/66.png" alt="66" class="wp-image-196458" srcset="https://insidegnss.com/wp-content/uploads/2026/03/66.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/66-300x30.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/66-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/66-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/66-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>And so ∀<em>z</em> ε<img decoding="async" src="blob:https://insidegnss.com/88721d0a-5539-41d1-a36e-4e6f343230ab" alt="">,<em>F<sub>X+Y</sub></em>(z)≤<em>F<sub>X</sub></em><sub>+</sub><em><sub>LY</sub></em>(z). Repeating the same argument:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="39" src="https://insidegnss.com/wp-content/uploads/2026/03/68.png" alt="68" class="wp-image-196459" srcset="https://insidegnss.com/wp-content/uploads/2026/03/68.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/68-300x37.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/68-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/68-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/68-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Combining the two inequalities of <strong>Equations 25</strong> and <strong>26,</strong> we get: </p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/69.png" alt="69" class="wp-image-196460" srcset="https://insidegnss.com/wp-content/uploads/2026/03/69.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/69-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/69-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/69-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/69-48x3.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p>The proof of the inverse inequality is established in a similar way without difficulties.&nbsp;</p>



<p><strong>Theorem 2b:</strong>&nbsp;If&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>], then for a positive real α we have α<em>X</em>⊆[α<em>L</em><em><sub>X</sub></em><em>,</em>α<em>R</em><em><sub>X</sub></em>]. However, for a negative real α, we have α<em>X</em>⊆[α<em>R</em><em><sub>X</sub></em><em>,</em>α<em>L</em><em><sub>X</sub></em>]. If we further require that the over-bounding pair is symmetric, meaning that&nbsp;<em>L</em><em><sub>X</sub></em>=<em>-R</em><em><sub>X</sub></em><em>,</em>&nbsp;we can write the result as follows: for all α, if&nbsp;<em>X</em>⊆[-<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>], then α<em>X</em>⊆[–|α|<em>R</em><em><sub>X</sub></em><em>,</em>|α|<em>R</em><em><sub>X</sub></em>].</p>



<h3 class="wp-block-heading" id="h-proof-1">Proof:</h3>



<p>We have for positive α:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="47" src="https://insidegnss.com/wp-content/uploads/2026/03/70.png" alt="70" class="wp-image-196461" srcset="https://insidegnss.com/wp-content/uploads/2026/03/70.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/70-300x44.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/70-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/70-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/70-48x7.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>On the other hand, for a negative α, we have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="51" src="https://insidegnss.com/wp-content/uploads/2026/03/71.png" alt="71" class="wp-image-196462" srcset="https://insidegnss.com/wp-content/uploads/2026/03/71.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/71-300x48.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/71-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/71-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/71-48x8.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>These theorems show the stability of linear combinations is satisfied with any pair of overbounds (possibility asymmetric or multi-modal) but only with positive coefficients. Unfortunately, this property is not sufficient to guarantee the integrity transfer from range to positioning domain (because the geometry coefficients are signed). The following Theorem permits to guarantee the stability of any linear combinations (with positive or negative coefficients) by adding a condition on the pair of overbounds that is&nbsp;<em>L</em><em><sub>X</sub></em><em>=–R</em><em><sub>X</sub></em>.</p>



<p><strong>Theorem 2c:</strong>&nbsp;If&nbsp;<em>X</em>⊆[–<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and&nbsp;<em>Y</em>⊆<br>[–<em>R</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;∀(α,β)∈<img decoding="async" src="blob:https://insidegnss.com/8205c683-8adb-444d-b948-7e47a84707b8" alt=""><sup>2</sup>, α<em>X</em>+β<em>Y</em>⊆<br>[–|α|R<sub>X</sub>–|β|<em>R</em><em><sub>Y</sub></em>,|α|<em>R</em><em><sub>X</sub></em>+|β|<em>R</em><em><sub>Y</sub></em>]. If the distribution of each of the residual measurement errors is paired-overbounded by a symmetric pair, then the position errors are also paired-overbounded by a known pair. Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>This approach is useful for taking residual biases into acount. Consider a given line of sight and a contributor&nbsp;<em>X</em>&nbsp;to the residual errors on this line of sight. This contributor presents a residual bias for which a known bound is μ.</p>



<p>We construct a bounding of distribution&nbsp;<em>X</em>&nbsp;by two Normal laws with standard deviation σ, the left bound biased by -μ and the right bound biased by +μ, which form a symmetric pair:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/73.png" alt="73" class="wp-image-196463" srcset="https://insidegnss.com/wp-content/uploads/2026/03/73.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/73-300x89.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/73-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/73-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/73-48x14.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If we collect all the lines of sight and each contributor to the measurement errors paired-overbounded, then the convolution property implies that the position error is also a paired-overbounded distribution with a variance and a bias given respectively by</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="416" height="114" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM.png" alt="Screen Shot 2026-03-03 at 7.39.04 PM" class="wp-image-196465" style="aspect-ratio:3.6493738819320214;width:208px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM.png 416w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-300x82.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-24x7.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-36x10.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-7.39.04-PM-48x13.png 48w" sizes="auto, (max-width: 416px) 100vw, 416px" /></figure>



<p>The limiting aspect is the search for left and right bounds can bring conservatism in practice, knowing these boundaries must frame the entire empirical distribution.</p>



<p><strong>Application to protection volumes:&nbsp;</strong>The pair overbounding&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] allows us to put a lower bound on the probability to be in a certain interval: for any&nbsp;<em>a,b</em>&nbsp;with&nbsp;<em>a</em>&lt;<em>b,</em>&nbsp;we have:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/76.png" alt="76" class="wp-image-196466" srcset="https://insidegnss.com/wp-content/uploads/2026/03/76.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/76-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/76-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/76-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/76-48x3.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>In the case of an overbounding pair by two Gaussians of mean ±μ and variance σ<sup>2</sup>, we have for a symmetric protection level:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/77.png" alt="77" class="wp-image-196467" srcset="https://insidegnss.com/wp-content/uploads/2026/03/77.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/77-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/77-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/77-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/77-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>and so the integrity condition <em>P</em>(X∈<br>[-PL,PL])≥1-IR can be ensured for</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/78.png" alt="78" class="wp-image-196469" srcset="https://insidegnss.com/wp-content/uploads/2026/03/78.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/78-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/78-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/78-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/78-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>If in the total error </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="164" height="72" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM.png" alt="Screen Shot 2026-03-03 at 8.04.41 PM" class="wp-image-196470" style="width:77px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM.png 164w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-36x16.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.04.41-PM-48x21.png 48w" sizes="auto, (max-width: 164px) 100vw, 164px" /></figure>



<p>&nbsp;each error component&nbsp;ε<em><sub>i</sub></em>&nbsp;is pair-overbounded by two Gaussian distribution with standard deviation σ<em><sub>i</sub></em>&nbsp;and mean ±μ, then by the stability by linear combinations, the total error&nbsp;<em>e</em>&nbsp;is pair-overbounded by two Gaussians of standard deviation σ=<img decoding="async" src="blob:https://insidegnss.com/4cb8a672-f895-4e88-a405-73455df8f175" alt="">&nbsp;and mean μ=<img decoding="async" src="blob:https://insidegnss.com/94256b07-88ce-4e65-916f-ec3dfd63c4f6" alt="">. Thus, the formula for the protection level is identical to the formula in the previous section, but with different hypothesis on the original distributions.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="378" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-1024x378.png" alt="Screenshot 2026-02-11 at 5.39.32 PM" class="wp-image-196525" style="width:563px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-1024x378.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-300x111.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-768x283.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM-48x18.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.32-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-core-tail-overbounding">Core-Tail Overbounding </h3>



<p>In general, the empirical distribution of interest is obtained by collecting large volumes of data. This is sufficient to accurately represent the core of the distribution but there is always a point where the tail remains unknown because the collected samples are always finite. Therefore, how can we ensure the constructed overbounding distribution remains correct for the entire underlying distribution?</p>



<p>Furthermore, if the tail of the underlying distribution is known analytically or with good numerical precision, the overbounding theorems presented impose a condition on the entire distribution. When using Gaussian overbounds, which have very light tails, this can lead to excessive conservatism, for example to absorb some mass far in the tail, or can be mathematically impossible if the analytic expression of the underlying distribution falls slower than a Gaussian.</p>



<p>The strategy presented by [6] is a mean to deal with these two problems. It divides the cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>&nbsp;of the overbound distribution into two parts: an explicit core and an implicit tail. The overbounding distribution is a mixture of both, and the value this function takes at a point is equal to the sum of the core cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and the tail cumulative distribution function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>, weighted by the probability&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;that the point is in the core or the tail:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/82.png" alt="82" class="wp-image-196471" srcset="https://insidegnss.com/wp-content/uploads/2026/03/82.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/82-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/82-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/82-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/82-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The core distribution is explicit, meaning it can be expressed analytically and calculations performed. Most often, it is a Gaussian distribution. As for the tail, which poses the most problems, it is left completely arbitrary: We know it exists, but we do not wish to perform calculations with it. Instead, we will always consider the worst possible tail for the chosen application to constrain the maximum impact of the unknown tail.</p>



<p>This approach is valid for both CDF-overbounding and paired overbounding. The benefit of this decomposition is to be able to focus on the core overbound, while ensuring the unknown tail of X is defined such that&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>(<em>x</em>) (defined by&nbsp;<strong>Equation 34</strong>) is an overbound of&nbsp;<em>X,&nbsp;</em>with the following approach of&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>&nbsp;as a pseudo CDF:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="40" src="https://insidegnss.com/wp-content/uploads/2026/03/83.png" alt="83" class="wp-image-196472" srcset="https://insidegnss.com/wp-content/uploads/2026/03/83.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/83-300x38.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/83-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/83-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/83-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Intuitively, inequality (24) means the worst tail for the CDF-overbounding is a probability weight of 1⁄2 localized at both infinities, whereas the worst tail for a left-overbound is to have all probability concentrated at minus infinity (plus infinity for the right overbound). Formally, the resulting overbounding function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>(<em>x</em>) is not a CDF (because its total weight is not 1) but as in the excess mass concept, all properties of the corresponding overbounding function remain unchanged.</p>



<p>In practice, a CDF-overbound in the core-tail overbounding concept consists of a (symmetric unimodal) function&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such that&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>=(1-<em>P</em><em><sub>t</sub></em>)&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>+<em>P</em><em><sub>t</sub></em>⁄2 (because for CDF-overbounding the tail CDF is always chosen as a constant of value 1⁄2) is a CDF-overbound of the distribution of interest X. In other words, we need&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such&nbsp;<em>X</em><img decoding="async" src="blob:https://insidegnss.com/4978958a-89de-4ed8-8fd3-d7166b615504" alt=""><em>O</em><em><sub>X</sub></em><em>.</em>&nbsp;For pair-overbounding, the left and right bounds are split into core and tail. We need a left and right core overbounding distribution&nbsp;<em>F</em><em><sub>L</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and&nbsp;<em>F</em><em><sub>R</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>&nbsp;and a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;such that:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/85.png" alt="85" class="wp-image-196473" srcset="https://insidegnss.com/wp-content/uploads/2026/03/85.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/85-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/85-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/85-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/85-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Graphical representations of core-tail overbounding is illustrated with&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;equals to 5&#215;10<sup>-2</sup>&nbsp;in&nbsp;<strong>Figure 3</strong>&nbsp;for CDF-overbounding by a Gaussian with standard deviation 0.7, and&nbsp;<strong>Figure 4</strong>&nbsp;for paired overbounding by two Gaussian with biais +/- 0.3 and standard deviation 0.7. The green area represents the domain that satisfies the overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>O</em><em><sub>X</sub></em><em>.</em></p>



<p>Note the core-tail overbounding is a weaker condition than the original overbounding condition, in the sense that any overbounding distribution (CDF or paired) can be seen as the core overbounding distribution with a tail weight&nbsp;<em>P</em><em><sub>t</sub></em>, whatever the value of&nbsp;<em>P</em><em><sub>t</sub></em>. The downside is the resulting protection volumes will be more conservative for larger tail weight, and can be undefined if the integrity risk is lower than the tail weight. This phenomenon allows for the following result as part of this new paradigm.</p>



<p><strong>Theorem 4:</strong>&nbsp;Let&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;be two random variables that admits a CDF-overbound (central or paired) that can be decomposed into a core part and a tail part with weight&nbsp;<em>P</em><em><sub>t,X</sub></em>&nbsp;and&nbsp;<em>P</em><em><sub>t,Y</sub></em>. Then the linear combination αX+βY admits a corresponding overbound with the core given by the theorem 1 or 2c, and with core weight (1-<em>P</em><em><sub>t,X</sub></em>)×(1-<em>P</em><em><sub>t,Y</sub></em>). Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<h3 class="wp-block-heading" id="h-proof-2">Proof:</h3>



<p>We will first consider the framework of the central CDF-overbound and the overbounding of&nbsp;<em>X</em>+<em>Y</em>. Theorem 1 (stability by convolution) gives us&nbsp;<em>X</em>+<em>Y</em>&nbsp;is overbounded by&nbsp;<em>O</em><em><sub>X</sub></em>+<em>O</em><em><sub>Y</sub></em>&nbsp;(the core-tail overbound remains a centered symmetric and unimodal distributions):</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/86.png" alt="86" class="wp-image-196474" srcset="https://insidegnss.com/wp-content/uploads/2026/03/86.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/86-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/86-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/86-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/86-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>We then inject into inequality (26) the decomposition of the overbounds of the random variables <em>X</em> and <em>Y</em> into core and tail.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/87.png" alt="87" class="wp-image-196475" srcset="https://insidegnss.com/wp-content/uploads/2026/03/87.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/87-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/87-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/87-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/87-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By expanding expression (38), we get</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="31" src="https://insidegnss.com/wp-content/uploads/2026/03/88.png" alt="88" class="wp-image-196476" srcset="https://insidegnss.com/wp-content/uploads/2026/03/88.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/88-300x29.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/88-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/88-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/88-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>On the other hand, the cumulative distribution function of the overbound of the sum is decomposed into core and tail parts:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="317" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/89.png" alt="89" class="wp-image-196477" srcset="https://insidegnss.com/wp-content/uploads/2026/03/89.png 317w, https://insidegnss.com/wp-content/uploads/2026/03/89-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/89-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/89-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/89-48x3.png 48w" sizes="auto, (max-width: 317px) 100vw, 317px" /></figure>



<p><br>By identification with&nbsp;<strong>Equations 38&nbsp;</strong>and&nbsp;<strong>39</strong>&nbsp;we find that:</p>



<p>1-<em>P</em><em><sub>O,t</sub></em>=(1-<em>P</em><em><sub>t,X</sub></em>)(1-<em>P</em><em><sub>t,Y</sub></em>), which gives the weight of the core,</p>



<p><em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>Y,c</sub></em>=<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,c</sub></em>, so the core of the sum is the convolution of the cores of each distribution,</p>



<p>The rest of the expression is considered as the tail and its explicit expression is not needed.</p>



<p>The last step is to prove by replacing the implicit tail part by the constant 1⁄2, we still have a CDF-overbounding of the sum. For&nbsp;<em>x</em>≤0, the three terms&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,t</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,c</sub></em>(<em>x</em>),&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em><sub>,c</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em><sub>,t</sub></em>&nbsp;(<em>x</em>),&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em><em>,t</em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em><em>,t</em>&nbsp;(<em>x</em>) are smaller than 1⁄2 because each one is a symmetric CDF. Thus, for negative&nbsp;<em>x,</em>&nbsp;<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>*<em>f</em><em><sub>O</sub></em><em><sub>Y</sub></em>(<em>x</em>)≤(1-<em>P</em><em><sub>O,t</sub></em>)×<em>F</em><em><sub>O</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>Y,c</sub></em>+<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>⁄2. On the positive side, the equations are reversed, and we get a CDF-overbound of the sum by considering only the core part of the two distributions. We can replace the tail part by its generic value.</p>



<p>The multiplication by a scalar is treated as in Theorem 1 and does not change the weight of the core or tail.&nbsp;</p>



<p>In the pair overbounding case, the resulting pair is symmetric if the core overbounding pair is symmetric, so formula of theorem 2c holds as long as each individual overbounding pair has the same core and tail weights for the left and right overbounding pair. The proof is very similar to the CDF-overbounding case.</p>



<p>The core-tail overbounding concepts allows us to manipulate a weaker form of CDF or paired-overbounding. It is weaker because the inequalities are not required on the entire CDF but only on the core part. The properties of stability by linear combination of the CDF and paired-overbounding are maintained but at the price of a small “contamination” of the tail for each added term. For each addition, the tail weight grows. An upper bound on the weight of the tail can easily be derived as follows: In the case where all weights are equal with tail weight&nbsp;<em>P</em><em><sub>t</sub></em><em>,</em>&nbsp;we have&nbsp;<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>=1-(1-P<sub>t</sub>&nbsp;)<sup>2</sup>&lt;2<em>P</em><em><sub>t</sub></em>, and by recurrence on n sources of errors, we have&nbsp;<em>P</em><em><sub>O,t</sub></em>&lt;<em>n</em><em>P</em><em><sub>t</sub></em>.</p>



<p><strong>Application to protection volumes: </strong>The protection volume formulas are identical to the CDF or paired-overbounding cases, with the replacement of the overbounding distribution by the core plus tail part. If we are working with Gaussian distributions, the properties of stability by linear combination allows us to use the same formulas by changing only the value of the <em>K</em>-factor, which now depends on the weight of the tail distribution. The compatible quantile <em>K</em> of a given integrity risk IR in the position domain is calculated by considering the CDF of the overbounding function and inverting it. The Gaussian K-factor changes for the CDF-overbound to:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="35" src="https://insidegnss.com/wp-content/uploads/2026/03/90.png" alt="90" class="wp-image-196478" srcset="https://insidegnss.com/wp-content/uploads/2026/03/90.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/90-300x33.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/90-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/90-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/90-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>For a protection volume to be calculable with the&nbsp;<em>K</em>-factor, it is necessary that IR-<em>P</em><em><sub>O,</sub></em><em><sub>t</sub></em>&gt;0 and thus that&nbsp;<em>P</em><em><sub>O,t</sub></em>&lt;IR. Otherwise, the knowledge of the core distribution is not sufficient to build a suitable protection volume and the protection level goes to infinity, and gives no information in practice.</p>



<p>For the paired CDF-overbound the&nbsp;<em>K</em>-factor changes to:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="33" src="https://insidegnss.com/wp-content/uploads/2026/03/91.png" alt="91" class="wp-image-196479" srcset="https://insidegnss.com/wp-content/uploads/2026/03/91.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/91-300x31.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/91-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/91-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/91-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Note the weight of the tail depends on the number of error contributors. If each error has an overbound tail weight&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;1, then the full error overbound has tail weight&nbsp;<em>n</em><em>P</em><em><sub>t</sub></em><em>.</em>&nbsp;This means the density of the tail distribution of each measurement error must be at least n times lower than the selected integrity risk for the position domain. In case this condition is not met, the protection volume is undefined (infinite) because the knowledge of the core distribution is not sufficient to guarantee a protection level at the given integrity risk.</p>



<p>If we have&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;<em>IR,</em>&nbsp;then we can use the usual K-factor formula (4).</p>



<p>The notion of core-tail overbounding is very important theoretically because it justifies the use of overbounding methods when the tail is not fully known, and it justifies the use of Gaussian overbounding even when the tail is heavier than a Gaussian. However, in practice, such conditions on&nbsp;<em>P</em><em><sub>t</sub></em>&nbsp;(<em>P</em><em><sub>t</sub></em>&lt;<em>I</em><em>R</em>⁄<em>n</em>&nbsp;or&nbsp;<em>P</em><em><sub>t</sub></em>&lt;&lt;<em>IR</em>) are challenging to verify because&nbsp;<em>IR</em>&nbsp;is already very low (usually about 10<sup>-7</sup>). This requires a fine knowledge of the error distribution to go far in the tail, which means a large experimental sample of values that is quite difficult to achieve. Thus, the core-tail overbounding technique is rarely used, and the assumption that the overbounding is valid up to infinity is often made.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="415" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-1024x415.png" alt="Screenshot 2026-02-11 at 5.39.45 PM" class="wp-image-196526" style="aspect-ratio:2.4675265066323955;width:587px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-1024x415.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-300x121.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-768x311.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM-48x19.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.45-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-excess-mass-for-paired-overbounding">Excess Mass for Paired Overbounding </h3>



<p>In practice, constructing pairs of overbounds can artificially increase biases or variances on each of the overbounds to correctly bound the empirical distribution function. While this operation is often necessary, it inevitably leads to conservatism and larger protection levels than needed.</p>



<p>The left bounding distribution must have a heavier tail on the left (on the negative side) than the original error distribution, while at the same time have a lighter tail on the right. Because Gaussian distributions are often used for overbounding, this double condition is difficult to achieve and is often met at the price of very large biases. This specific problem with the pair overbounding technique can be partially resolved by the concept of excess mass overbounding [5] (excess mass CDF method), which considers a distribution mass greater than 1, typically 1+ ε where ε is referred as excess mass.</p>



<p>With such mass, the pseudo CDF is allowed to pass either beyond +1 or below -1. With this flexibility, we only need to ensure the properties of the overbound on one side of the empirical distribution, knowing the other side is no longer constrained. For Gaussian pair-overbounds, this adds a third degree of freedom to the variance and the bias.</p>



<p>Formally, we consider&nbsp;<em>f,</em>&nbsp;a pseudo-PDF that is positive and integrable, but we do not impose that its total probability weight is 1. Instead, we allow a total mass 1+ε larger than one&nbsp;<strong>(Equation 43).</strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="320" height="20" src="https://insidegnss.com/wp-content/uploads/2026/03/92.png" alt="92" class="wp-image-196480" srcset="https://insidegnss.com/wp-content/uploads/2026/03/92.png 320w, https://insidegnss.com/wp-content/uploads/2026/03/92-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/92-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/92-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/92-48x3.png 48w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure>



<p>The associated left pseudo-CDF is defined as&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>)=(1+ε)×<em>F</em><em>~</em><em><sub>L</sub></em>(<em>x</em>), where&nbsp;<em>F</em><em>~</em><em><sub>L</sub></em>&nbsp;is a regular CDF with total weight equal to 1. This means&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>) tends to 0 as the variable&nbsp;<em>x</em>&nbsp;approaches negative infinity as a regular CDF, but tends to 1+ε as&nbsp;<em>x</em>&nbsp;approaches infinity, relaxing the overbounding constraint by the left overbounding on the right.</p>



<p>For the right overbound&nbsp;<em>F</em><em><sub>R</sub></em>(<em>x</em>), the excess mass is applied on the survival function: 1–<em>F</em><em><sub>R</sub></em>(<em>x</em>)=(1+ε)×(1–<em>F</em><em>~</em><em><sub>R</sub></em>(x)), where&nbsp;<em>F</em><em>~</em><em><sub>R</sub></em>(x) is a regular CDF, which leads to&nbsp;<em>F</em><em><sub>R</sub></em>(<em>x</em>)=(1+ε)×<em>F</em><em>~</em><em><sub>R</sub></em>(x)-ε. Consequently, the right pseudo-CDF goes to 1 as x approaches infinity like a regular CDF but tends to a negative value when x goes to negative infinity.</p>



<p>With this definition, the concept of pairs of overbounds can be expressed in the same terms and exhibits the same properties, particularly the stability under convolution (the proof can be reproduced identically as it uses only the positivity of the PDF), noting the mass of the sum of random variables is the product of the masses of each variable. Specifically, if the variables&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;have respectively masses 1+ε<em><sub>X</sub></em>&nbsp;and 1+ε<sub>Y</sub>, then the sum&nbsp;<em>X</em>+<em>Y</em>&nbsp;has a mass of (1+ε<em><sub>X</sub></em>)×(1+ε<em><sub>Y</sub></em>).&nbsp;</p>



<p><strong>Definition:</strong>&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;associated to the pseudo-PDF&nbsp;<em>f</em><em><sub>L</sub></em>&nbsp;and&nbsp;<em>f</em><em><sub>R</sub></em>&nbsp;define a paired overbound with excess mass ε of the random variable&nbsp;<em>X,</em>&nbsp;and we note&nbsp;<em>X</em>⊆[<em>L</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] if&nbsp;</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="45" src="https://insidegnss.com/wp-content/uploads/2026/03/93.png" alt="93" class="wp-image-196481" srcset="https://insidegnss.com/wp-content/uploads/2026/03/93.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/93-300x42.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/93-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/93-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/93-48x7.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>where&nbsp;<em>F</em><em><sub>L</sub></em>(<em>x</em>) and&nbsp;<em>F</em><em>~</em><em><sub>R</sub></em>(<em>x</em>) are regular CDF (with total probability weight equal to 1).</p>



<p><strong>Theorem 3:</strong>&nbsp;If&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>&nbsp;are paired-overbounded with excess mass by a symmetric pair then the linear combinations are also paired-overbounded by a known formula. If&nbsp;<em>X</em>⊆[–<em>R</em><em><sub>X</sub></em><em>,R</em><em><sub>X</sub></em>] and&nbsp;<em>Y</em>⊆[–<em>R</em><em><sub>Y</sub></em><em>,R</em><em><sub>Y</sub></em>] then&nbsp;∀(α,β)∈<img decoding="async" src="blob:https://insidegnss.com/2a0bfb77-84b2-4763-a510-fe197c617cde" alt=""><sup>2</sup>, α<em>X</em>+β<em>Y</em>&nbsp;⊆[–|α|<em>R</em><em><sub>X</sub></em>–|β|<em>R</em><em><sub>Y</sub></em><em>,</em>|α|<em>R</em><em><sub>X</sub></em>+|β|<em>R</em><em><sub>Y</sub></em>]. (Here&nbsp;<em>–</em><em>R</em><em><sub>X</sub></em>&nbsp;is defined as having the pseudo-PDF&nbsp;<em>f</em><em><sub>R</sub></em>(<em>-x</em>) and the sum and multiplication by a scalar are defined as for regular random variables). The total mass of the overbounding of the linear combination is (1+ε<em><sub>X</sub></em>)×(1+ε<em><sub>Y</sub></em>). Under these conditions, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p>The proof is the same as the equivalent proof for paired-overbounding. With each addition, the total weight of the excess mass overbounding pair grows as it is the product of all masses involved.</p>



<p><strong>Figure 5</strong>&nbsp;illustrates paired overbounding with excess mass ε equals to 2.5×10<sup>&#8211;</sup><sup>2</sup>. The overbounds are two Gaussian with bias –/+ 0.3 and standard deviation 0.7 and the green area represents the domain that satisfies the overbounding of&nbsp;<em>X</em>&nbsp;by&nbsp;<em>L</em><em><sub>X</sub></em>&nbsp;on the left and&nbsp;<em>R</em><em><sub>X</sub></em>&nbsp;on the right. The QQ plot representation is not applicable to excess mass because the overbounds has total weight greater than 1. The allowed green zone is much larger with excess mass than in&nbsp;<strong>Figure 2,</strong>&nbsp;making the condition easier to verify.</p>



<p><strong>Application to protection volumes:</strong>&nbsp;In the case of overbounding by Gaussian pseudo–PDFs, all the convenient addition properties of the Gaussian-distributed vector are maintained. All the formulas derived for the protection volume build with pair-overbounding remain valid, with only a modification in the&nbsp;<em>K</em>-factor. Explicit calculations show the new expression of the&nbsp;<em>K</em>-factor is</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="486" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM.png" alt="Screen Shot 2026-03-03 at 8.15.11 PM" class="wp-image-196482" style="aspect-ratio:5.170305676855895;width:165px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM.png 486w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-300x58.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-36x7.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.15.11-PM-48x9.png 48w" sizes="auto, (max-width: 486px) 100vw, 486px" /></figure>



<p>Because the complementary error function erfc is decreasing, we see&nbsp;<em>K</em>&nbsp;increases with ε. Thus, a larger excess mass makes it easier to pair-overbound the distribution, but leads to larger protection volumes.</p>



<p>When all the error sources&nbsp;<em>i</em>&nbsp;are paired-overbounded with excess mass by Gaussian distributions of standard deviation σ<em><sub>i</sub></em>, bias ±μ<em><sub>i</sub></em>&nbsp;and excess mass ε<em><sub>i</sub></em>,the calculation of the protection volume remains particularly simple. It is given by</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="16" src="https://insidegnss.com/wp-content/uploads/2026/03/96.png" alt="96" class="wp-image-196483" srcset="https://insidegnss.com/wp-content/uploads/2026/03/96.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/96-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/96-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/96-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/96-48x2.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Where </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="264" height="86" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM.png" alt="Screen Shot 2026-03-03 at 8.17.05 PM" class="wp-image-196484" style="width:107px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM.png 264w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.17.05-PM-48x16.png 48w" sizes="auto, (max-width: 264px) 100vw, 264px" /></figure>



<p>ξ is the multiplicative factor defined by <strong>Equation 16</strong> and inflating <em>K</em>-factor defined by <strong>Equation 46.</strong></p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="34" src="https://insidegnss.com/wp-content/uploads/2026/03/98.png" alt="98" class="wp-image-196485" srcset="https://insidegnss.com/wp-content/uploads/2026/03/98.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/98-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/98-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/98-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/98-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Note the excess mass, as proposed in [5] requires the true tail is Gaussian or lighter to the Gaussian, because the overbound must hold up to infinite. It is interesting to combine the excess mass with core-tail approaches. We propose to include the excess mass only on the core overbound. In this case, we have for each error contributor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="18" src="https://insidegnss.com/wp-content/uploads/2026/03/99.png" alt="99" class="wp-image-196486" srcset="https://insidegnss.com/wp-content/uploads/2026/03/99.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/99-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/99-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/99-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/99-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By projecting <strong>Equation 47</strong> in position domain, we get:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/100.png" alt="100" class="wp-image-196487" srcset="https://insidegnss.com/wp-content/uploads/2026/03/100.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/100-300x40.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/100-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/100-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/100-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p><strong>Equation 48</strong> can be arranged as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/101.png" alt="101" class="wp-image-196488" srcset="https://insidegnss.com/wp-content/uploads/2026/03/101.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/101-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/101-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/101-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/101-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>By inverting the equation, we get, in <strong>Equation 50,</strong> the new formulation for <em>K</em>-factor:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="26" src="https://insidegnss.com/wp-content/uploads/2026/03/102.png" alt="102" class="wp-image-196489" srcset="https://insidegnss.com/wp-content/uploads/2026/03/102.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/102-300x25.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/102-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/102-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/102-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="990" height="1024" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-990x1024.png" alt="Screenshot 2026-02-11 at 5.39.55 PM" class="wp-image-196527" style="aspect-ratio:0.9668021436535625;width:432px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-990x1024.png 990w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-290x300.png 290w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-768x794.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-24x24.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-36x36.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM-46x48.png 46w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.39.55-PM.png 1164w" sizes="auto, (max-width: 990px) 100vw, 990px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-two-steps-overbounding">Two Steps Overbounding </h3>



<p>The objective of the approach proposed in [7] is to mix the two concepts of central CDF-overbound and paired overbound. From the empirical distribution of an unmodelled residual error, the objective is to construct a weaker form of paired overbound by Gaussian distributions (the Gaussian distribution is chosen for computational simplicity).</p>



<p>We start by constructing an intermediate pair-overbound where each bound is unimodal and symmetrical around its mean, but not necessarily Gaussian. We know (Theorem 3) this paired overbound is stable by convolution. We impose the properties of symmetry and unimodality because they are part of the hypotheses of the CDF-overbound. The second step is to find a Gaussian distribution (necessarily symmetrical and unimodal around their mean) where CDF-overbounds the left and right distributions. The assumptions of the CDF-overbound are met and imply these pairs of Gaussians overbounds are stable by convolution.</p>



<p>The result of this method are the two Gaussian variables</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="114" height="66" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM.png" alt="Screen Shot 2026-03-03 at 8.21.03 PM" class="wp-image-196490" style="width:59px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM.png 114w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.21.03-PM-48x28.png 48w" sizes="auto, (max-width: 114px) 100vw, 114px" /></figure>



<p>which have the following property:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="37" src="https://insidegnss.com/wp-content/uploads/2026/03/104.png" alt="104" class="wp-image-196491" srcset="https://insidegnss.com/wp-content/uploads/2026/03/104.png 319w, https://insidegnss.com/wp-content/uploads/2026/03/104-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/104-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/104-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/104-48x6.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>The resulting properties of the two-step overbounding are weaker than those of the pair-overbounding, but they are sufficient to build a protection volume as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="15" src="https://insidegnss.com/wp-content/uploads/2026/03/105.png" alt="105" class="wp-image-196492" srcset="https://insidegnss.com/wp-content/uploads/2026/03/105.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/105-300x14.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/105-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/105-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/105-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where&nbsp;<em>K</em>&nbsp;is the usual factor computed with Gaussian distributions&nbsp;<strong>(Equation 4).</strong></p>



<p>This protection level is correct because of</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="27" src="https://insidegnss.com/wp-content/uploads/2026/03/106.png" alt="106" class="wp-image-196493" srcset="https://insidegnss.com/wp-content/uploads/2026/03/106.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/106-300x25.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/106-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/106-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/106-48x4.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The goal is to build a Gaussian two-steps overbound defined by μ<em><sub>X</sub></em><em>,</em>&nbsp;σ<em><sub>X</sub></em>&nbsp;that is stable by linear combination, making it possible to perform the overbounding at range level and to build a protection volume at position level.</p>



<p><strong>Theorem 5:</strong>&nbsp;If μ<em><sub>X</sub></em>, σ<em><sub>X</sub></em>&nbsp;define a two-steps overbound of&nbsp;<em>X</em>&nbsp;and μ<em><sub>Y</sub></em>, σ<em><sub>Y</sub></em>&nbsp;define a two-steps overbound of&nbsp;<em>Y,</em>&nbsp;then the linear combination&nbsp;<em>Z</em>=α<em>X</em>+β<em>Y</em>&nbsp;can be two-steps overbounded by a pair of Gaussians with bias μ<em><sub>Z</sub></em>=|α| μ<em><sub>X</sub></em>+|β| μ<em><sub>Y</sub></em>&nbsp;and variance</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="304" height="102" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM.png" alt="Screen Shot 2026-03-03 at 8.24.18 PM" class="wp-image-196494" style="width:155px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM.png 304w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-300x101.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.24.18-PM-48x16.png 48w" sizes="auto, (max-width: 304px) 100vw, 304px" /></figure>



<p>Under this condition, integrity in the pseudorange domain imply integrity in the position domain.</p>



<p><strong>Proof:</strong></p>



<p>The proof makes extensive use of previous results. Let us start with stability by convolution and consider&nbsp;<em>Z</em>=<em>X</em>+<em>Y</em>. Can we build a two-steps overbound of&nbsp;<em>Z</em>&nbsp;from the two-steps overbounds of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>?</p>



<p>We know the intermediate paired overbounding is stable by convolution, and this step requires no particular assumption on the underlying distributions of&nbsp;<em>X</em>&nbsp;and&nbsp;<em>Y</em>:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="14" src="https://insidegnss.com/wp-content/uploads/2026/03/108.png" alt="108" class="wp-image-196495" srcset="https://insidegnss.com/wp-content/uploads/2026/03/108.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/108-300x13.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/108-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/108-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/108-48x2.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Then we use that the CDF-overbounding is stable by convolution. This is where the unimodality and symmetry around the median of the intermediate distributions is essential:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="17" src="https://insidegnss.com/wp-content/uploads/2026/03/109.png" alt="109" class="wp-image-196496" srcset="https://insidegnss.com/wp-content/uploads/2026/03/109.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/109-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/109-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/109-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/109-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Because the CDF-overbounds are Gaussian, we have&nbsp;<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>L</sub></em><em><sub>Y</sub></em>~N(μ<em><sub>L</sub></em><em><sub>X</sub></em>+μ<em><sub>L</sub></em><em><sub>Y</sub></em>,&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>L</sub></em><em><sub>Y</sub></em>) and similarly for&nbsp;<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>+<em>O</em><em><sub>R</sub></em><em><sub>Y</sub></em>.</p>



<p>Finally, μ<em><sub>Z</sub></em>=μ<em><sub>X</sub></em>+μ<em><sub>Y</sub></em>, we have μ<em><sub>Z</sub></em>≥ max (|μ<em><sub>L</sub></em><em><sub>X</sub></em>+μ<em><sub>L</sub></em><em><sub>Y</sub></em>|,|μ<em><sub>R</sub></em><em><sub>X</sub></em>+μ<em><sub>R</sub></em><em><sub>Y</sub></em>|) and also&nbsp;σ<sup>2</sup><em><sub>Z</sub></em>≥&nbsp;max(σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>L</sub></em><em><sub>Y</sub></em>,&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>+σ<sup>2</sup><em><sub>R</sub></em><em><sub>Y</sub></em>). Because the tail probability for a Gaussian distribution is an increasing function of the standard deviation and the mean, the previous inequalities ensures the two Gaussian variables</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="144" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM.png" alt="Screen Shot 2026-03-03 at 8.27.03 PM" class="wp-image-196497" style="aspect-ratio:1.4402535657686213;width:62px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM.png 144w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-24x17.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-36x25.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.27.03-PM-48x33.png 48w" sizes="auto, (max-width: 144px) 100vw, 144px" /></figure>



<p>of mean ±μ<em><sub>Z</sub></em> and variance σ<sup>2</sup><em><sub>Z</sub></em> have the following property:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="47" src="https://insidegnss.com/wp-content/uploads/2026/03/111.png" alt="111" class="wp-image-196498" srcset="https://insidegnss.com/wp-content/uploads/2026/03/111.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/111-300x44.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/111-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/111-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/111-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>which is the essential property for the protection level to be correct.&nbsp;</p>



<p>Note these properties on the tails of the distributions are necessary for the protection level formula to be correct but are not in themselves sufficient for a two-steps overbound because they are not stable by convolution. The stability by addition comes from the intermediate paired-overbound constructed in the first step.</p>



<p>The multiplication by a scalar poses no additional difficulties: if&nbsp;<em>Z</em>=α<em>X</em>&nbsp;then&nbsp;<em>Z</em>&nbsp;⊆&nbsp;[α<em>L</em><em><sub>X</sub></em><em>,</em>α<em>R</em><em><sub>X</sub></em>] if α if positive (and&nbsp;<em>Z</em>&nbsp;⊆&nbsp;[α<em>R</em><em><sub>X</sub></em><em>,</em>α<em>L</em><em><sub>X</sub></em>] for the negative case). In both cases α<em>L</em><em><sub>X</sub></em><img decoding="async" src="blob:https://insidegnss.com/25f5140c-7551-4f53-9041-2f4cfa84db29" alt="">α<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>&nbsp;and α<em>R</em><em><sub>X</sub></em><img decoding="async" src="blob:https://insidegnss.com/25f5140c-7551-4f53-9041-2f4cfa84db29" alt="">α<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>&nbsp;because the considered distributions are unimodal and symmetric around their means. We have α<em>O</em><em><sub>L</sub></em><em><sub>X</sub></em>~N(αμ<em><sub>L</sub></em><em><sub>X</sub></em>,α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>) and α<em>O</em><em><sub>R</sub></em><em><sub>X</sub></em>~N(αμ<em><sub>R</sub></em><em><sub>X</sub></em>, α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>) and the choice μ<em><sub>Z</sub></em>=|α|μ<em><sub>X</sub></em>&nbsp;and σ<em><sub>Z</sub></em>=α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>X</sub></em>&nbsp;ensures μ<em><sub>Z</sub></em>≥max (|αμ<em><sub>L</sub></em><em><sub>X</sub></em>|,|αμ<em><sub>R</sub></em><em><sub>X</sub></em>|) and σ<sup>2</sup><em><sub>Z</sub></em>≥max (α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>L</sub></em><em><sub>X</sub></em>, α<sup>2</sup>&nbsp;σ<sup>2</sup><em><sub>R</sub></em><em><sub>X</sub></em>).&nbsp;</p>



<p>The two-steps overbounding construction allows for the transfer of integrity from the measurement domain to the position domain without specific assumptions of symmetry, centering and unimodality of the empirical error distribution by transmitting only two Gaussian parameters per line-of-sight (namely μ<em><sub>X</sub></em>&nbsp;and σ<sup>2</sup><em><sub>X</sub></em>). This approach is less conservative than the paired overbound by two symmetric Gaussians because the needed property concerns only the left tail</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="764" height="104" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM.png" alt="Screen Shot 2026-03-03 at 8.29.41 PM" class="wp-image-196499" style="width:235px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM.png 764w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.29.41-PM-48x7.png 48w" sizes="auto, (max-width: 764px) 100vw, 764px" /></figure>



<p>The stability by linear combination is guaranteed by the existence of the intermediate symmetric and unimodal paired-overbound, but the explicit knowledge of the intermediate distribution is not needed for protection volume calculation.</p>



<p>The limiting aspect of the two steps overbounding method is the quality of the final overbound is very dependent on the construction of the first paired overbounds (first step). This step requires a complex optimization algorithm, with one such algorithm described in [7]. Another drawback of the method is it is difficult for a user with knowledge of the original error distribution and the parameters μ<em><sub>X</sub></em>&nbsp;and σ<sup>2</sup><em><sub>X</sub></em><em>&nbsp;</em>to verify the received parameters effectively form a correct two-steps overbounding of the error distribution without the information of the algorithm used in the first step.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="520" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-1024x520.png" alt="Screenshot 2026-02-11 at 5.40.02 PM" class="wp-image-196528" style="width:526px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-1024x520.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-300x152.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-768x390.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM-48x24.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.02-PM.png 1166w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-wide-sense-cdf-overbounding">Wide Sense CDF-Overbounding </h3>



<p>The approach of Weak CDF-over-bounding is introduced in [11]. Similar to the two-step overbound concept, the approach aims at taking advantage of both the CDF-overbounding and pair-overbounding definitions: the simplicity of the first one and the robustness of the second. The main idea is to impose a condition equivalent to CDF-overbounding for biased distribution, but without the assumptions of symmetry and unimodality. When performing linear combinations, the stability of the protection volume formula is lost because of the dropped assumptions. However, it is possible to quantify and bound the worst deviations from the Gaussian distribution and encapsulate them in a suitable inflation factor in the protection volume formula to ensure integrity.</p>



<p>In more precise terms, let&nbsp;<em>X</em>&nbsp;be a distribution (typically the distribution of an error contributor in a GNSS pseudorange measurement) with median b. We do not require&nbsp;<em>X</em>&nbsp;to be unimodal nor symmetric around its median. A weak CDF-overbound is given by a pair of Gaussians with mean ±μ<em><sub>X</sub></em>&nbsp;and identical variance σ<sup>2</sup>&nbsp;such that μ<sub>X</sub>≥|b| and furthermore:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="43" src="https://insidegnss.com/wp-content/uploads/2026/03/116.png" alt="116" class="wp-image-196500" srcset="https://insidegnss.com/wp-content/uploads/2026/03/116.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/116-300x41.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/116-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/116-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/116-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>The condition is identical to the second step of the two-steps overbounding method, but without the first step guaranteeing the stability of the property under linear combinations. If our quantity of interest is given by</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="218" height="100" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM.png" alt="Screen Shot 2026-03-03 at 8.31.51 PM" class="wp-image-196501" style="width:105px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM.png 218w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.31.51-PM-48x22.png 48w" sizes="auto, (max-width: 218px) 100vw, 218px" /></figure>



<p>where all <em>X<sub>i</sub></em> are individually weakly CDF-overbounded by Gaussian pairs of parameters μ<em><sub>i</sub></em> and σ<em><sub>i</sub></em> and <em>n</em> being the number of each error source, it is shown in [11] that the weak CDF-overbounding condition is sufficient to build a protection volume for <em>E.</em> The protection level formula is:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="48" src="https://insidegnss.com/wp-content/uploads/2026/03/118.png" alt="118" class="wp-image-196502" srcset="https://insidegnss.com/wp-content/uploads/2026/03/118.png 318w, https://insidegnss.com/wp-content/uploads/2026/03/118-300x45.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/118-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/118-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/118-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>In this formula, <em>K</em> is the usual Gaussian <em>K</em>-factor (σ is the usual Gaussian standard deviation) where</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="266" height="94" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM.png" alt="Screen Shot 2026-03-03 at 8.33.34 PM" class="wp-image-196503" style="width:91px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM.png 266w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.33.34-PM-48x17.png 48w" sizes="auto, (max-width: 266px) 100vw, 266px" /></figure>



<p>and the new term&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;is an inflation factor that takes into account the weaker assumptions taken in the definition. It quantifies somehow the worst deviations from the Gaussian distribution if each term follows the weak CDF-overbound condition. The inflation factor&nbsp;<em>A</em><em><sub>n,K&nbsp;</sub></em>depends on the value of the&nbsp;<em>K</em>-factor (and the required integrity risk) but also on the number of terms in the linear combination. The factor&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;has no simple analytical formula, but a table of values can be pre-computed and used as such in a given context.</p>



<p>Note the parameter&nbsp;<em>n</em>&nbsp;is the number of independent error contributors and can be larger than the number of satellites in view if there are several error sources for each line-of-sight.</p>



<p>In this method, the properties of CDF-overbounding cannot be used directly because important assumptions on the unknown distribution are not met. However, the conditions of CDF-overbounding by a Gaussian are equivalent to a pair-overbound by two symmetric distributions, the left and right half-Gaussian. Furthermore, the properties of pair-overbounding do not use the assumptions of symmetry and unimodality. One can build a pair-overbound of the final error distribution as linear combinations of half-Gaussians. The last step is to build a pair-overbounding distribution for all coefficients in the linear combinations of half-Gaussians, such that the result is independent of the geometry of the problem. This allows conservative protection volumes to be built for a specific integrity risk. These protection levels are then divided by the usual&nbsp;<em>K</em>-factor and interpreted as an inflation factor&nbsp;<em>A</em><em><sub>n,K</sub></em>&nbsp;integrated in the protection volume formula. Note the factors presented in&nbsp;<strong>Table 1</strong>&nbsp;and [11] are upper-bounds and future improvements on the method may reduce the numerical values of the inflation factors and thus of the protection volumes.</p>



<p>The main advantage of weak CDF-overbounding is its simplicity. The condition to verify for weak CDF-overbounding is of the same complexity as usual CDF-overbounding, but fewer assumptions on the underlying distribution are needed. The user only needs to store a pre-computed table of values of inflation factors (computed for the required integrity risk) to use when computing its protection volume. On the other hand, weak CDF-overbounding can lead to large protection volumes if the number of contributors is large and the&nbsp;<em>K</em>-factor is low.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1336" height="1418" src="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM.png" alt="Screenshot 2026-02-11 at 5.40.22 PM" class="wp-image-196529" style="aspect-ratio:0.9423973635311853;width:720px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM.png 1336w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-283x300.png 283w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-965x1024.png 965w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-768x815.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-24x24.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-34x36.png 34w, https://insidegnss.com/wp-content/uploads/2026/03/Screenshot-2026-02-11-at-5.40.22-PM-45x48.png 45w" sizes="auto, (max-width: 1336px) 100vw, 1336px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-conclusion">Conclusion </h3>



<p>This article shows the overbounding concepts that play a crucial role in demonstrating integrity are neither intuitive nor straightforward. However, the overbounding concepts using Gaussian overbounds are designed to keep the procedure as simple as possible. Indeed, the stability by linear combination of the overbounding properties and of the Gaussian distribution allows the user to manipulate the range errors as if they were Gaussian (by adding their standard deviations in quadrature) and apply the protection volume formula that mostly differ by the&nbsp;<em>K</em>-factor. From the integrity system point of view, the advantage is to focus on monitoring range error distribution and to send few parameters to the user, allowing for the construction of correct protection volumes.&nbsp;</p>



<p><strong>Table 2</strong>&nbsp;summarizes the main assumptions and implications of the different concepts applied to Gaussian overbounds.</p>



<p>Despite extensive work on the subject, several open points remain on overbounding.&nbsp;</p>



<p>First of all, all the studied concepts consider independence between all contributions to the positioning errors, and consequently between line of sights&nbsp;<strong>(Table 1).</strong>&nbsp;In practice, a correlation between the lines of sight could be caused by the troposphere residual errors, multipath or ODTS algorithm. [12] introduced a Power Spectral Density (PSD) overbounding concept that can guarantee integrity transfer of correlated Gaussian errors (with unknown and arbitrary correlation pattern), using a Gauss-Markov processes that overbound the PSD. To our knowledge, this concept is not used for single point positioning but is key for the integrity demonstration for Kalman filter. Generalization of this concept to non-Gaussian distributions will be a key step both for single point positioning and Kalman filtering.</p>



<p>Secondly, the concepts of overbounding presented are adapted to one dimensional quantities only. For example, the protection level formulas should be applied direction by direction for the positioning solution. A theory of overbounding multidimensional distributions is missing to, for example, build a protection volume for the norm of the horizontal positioning error. One difficulty of such a theory is the norm of a vector is not a linear combination of its components, and thus all the properties presented do not apply to this problem [13].&nbsp;</p>



<p>Last, the practical evaluation of overbounding remains a challenge because it involves estimating quantiles with low probability. This requires collecting and analyzing huge quantities of experimental data, which is costly, cumbersome and generally unrealistic. A promising alternative could be to extrapolate the tails of the distributions beyond the available data based on extreme value theory. </p>



<h3 class="wp-block-heading" id="h-appendix">Appendix</h3>



<p><strong>CDF OF THE SUM OF TWO INDEPENDENT RANDOM VARIABLES</strong></p>



<p>We start by formulating the expression for the CDF of the sum X+Y. By definition of the CDF, F_(X+Y) (z)=P(X+Y≤z). The probability P(X+Y≤z) is obtained by integrating the join density function f_(X,Y) (x,y) of the couple of random variables (X,Y) on the set of x,y respecting the inequality x+y≤z or equivalently y≤z-x. As the random variables X and Y are independent, the joint PDF is the product of the individual PDFs:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="67" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-1024x67.png" alt="Screen Shot 2026-03-03 at 8.46.56 PM" class="wp-image-196505" style="aspect-ratio:15.285754904748366;width:596px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-1024x67.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-768x50.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.46.56-PM.png 1354w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The PDF of the sum of the two independent variables X and Y is obtained by making, in Equation 59, the change of variable y=v-x, interchanging the order of integration, and derivating the CDF with respect to z:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="59" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-1024x59.png" alt="Screen Shot 2026-03-03 at 8.48.27 PM" class="wp-image-196506" style="aspect-ratio:17.358734258960283;width:608px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-1024x59.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-768x44.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.48.27-PM.png 1360w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Thus, the density f_(X+Y) appear as the classic convolution product Equation 61 of the densities, noted as f_(X+Y)=f_X*f_Y:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="84" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-1024x84.png" alt="Screen Shot 2026-03-03 at 8.49.50 PM" class="wp-image-196507" style="aspect-ratio:12.192273665585374;width:646px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-1024x84.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-300x24.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-768x63.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.49.50-PM.png 1396w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The CDF of the sum of the two variables X and Y is obtained by recognizing in Equation 59 the CDF of the random variable Y:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="76" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-1024x76.png" alt="Screen Shot 2026-03-03 at 8.51.02 PM" class="wp-image-196508" style="aspect-ratio:13.483822422874342;width:634px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-1024x76.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-300x22.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-768x57.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.51.02-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Injecting F_Y (z-x) given by Equation 62 in the expression of F_(X+Y) (z) in Equation 59, we then get:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="92" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-1024x92.png" alt="Screen Shot 2026-03-03 at 8.52.16 PM" class="wp-image-196509" style="width:623px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-1024x92.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-300x27.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-768x69.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.52.16-PM.png 1378w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>By making the integral of the joint density function respecting now the inequality x≤z-y in Equation 59, it comes:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="96" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-1024x96.png" alt="Screen Shot 2026-03-03 at 8.53.40 PM" class="wp-image-196510" style="width:683px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-1024x96.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-300x28.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-768x72.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM-48x5.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.53.40-PM.png 1424w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Therefore, the CDF of the sum of the two variables X and Y is the convolution of the CDF of the one with the PDF on the other indifferently:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="57" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-1024x57.png" alt="Screen Shot 2026-03-03 at 8.54.52 PM" class="wp-image-196511" style="aspect-ratio:17.967914438502675;width:701px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-1024x57.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-768x43.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.54.52-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p><strong>SUM OF TWO SYMMETRIC UNIMODAL RANDOM VARIABLES</strong></p>



<p>In this section, we want to prove the following: if X and Y are two independent, symmetric and unimodal random variables, then their sum X+Y is also symmetric and unimodal [8].&nbsp;</p>



<p>Let f_X, f_Y, be the PDFs of X and Y and f_(X+Y)=f_X*f_Y the PDF of X+Y. Then f_(X+Y) is symmetric because, for all x∈R:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="79" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-1024x79.png" alt="Screen Shot 2026-03-03 at 8.56.28 PM" class="wp-image-196512" style="aspect-ratio:12.96358813600193;width:687px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-1024x79.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-300x23.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-768x60.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM-48x4.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.56.28-PM.png 1366w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>In this manipulation, we have used the symmetry of f_X and f_Y and the change of variable t→-t.</p>



<p>Let us now fix two reals 0≤a≤b and prove that f_(X+Y) (a)≥f_(X+Y) (b). We have from the ordering of a and b that for all x, |x-a|≥|x-b| if x≥((a+b))⁄2 and |x-a|≤|x-b| if x≤((a+b))⁄2. From the unimodality and symmetry of Y, this implies that f_Y (x-a)≤f_Y (x-b) if x≥((a+b))⁄2 and the contrary if x≤((a+b))⁄2. Similarly, we have, for x≥((a+b))⁄2, |x|≥|x-a-b| and so f_X (x)≤f_X (x-a-b) and also, for x≤((a+b))⁄2, f_X (x)≥f_X (x-a-b).</p>



<p>This shows that for all x∈R, we have:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="63" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-1024x63.png" alt="Screen Shot 2026-03-03 at 8.57.40 PM" class="wp-image-196513" style="aspect-ratio:16.2564257635319;width:715px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-1024x63.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-300x18.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-768x47.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.57.40-PM.png 1428w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Because both terms are positive for x≤((a+b))⁄2, else both terms are negative.</p>



<p>Integrating the positive product defining by Equation 66 on x, and using the symmetry of f_X,f_Y we get:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="118" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-1024x118.png" alt="Screen Shot 2026-03-03 at 8.58.53 PM" class="wp-image-196514" style="width:729px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-1024x118.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-768x89.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM-48x6.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.58.53-PM.png 1418w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>And using the symmetry of f_(X+Y), right side of inequation 67 becomes:</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="52" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-1024x52.png" alt="Screen Shot 2026-03-03 at 8.59.55 PM" class="wp-image-196515" style="aspect-ratio:19.584699453551913;width:725px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-1024x52.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-300x15.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-768x39.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM-48x2.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-8.59.55-PM.png 1410w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>Thus f_(X+Y) is decreasing for positive x, which proves the unimodality of X+Y.</p>



<p><strong>A COUNTER EXAMPLE TO A NAÏVE APPROACH </strong></p>



<p>For a given integrity risk IR and associated Gaussian K-factor, it is tempting to check integrity at the pseudorange level by making sure that for all lines of sight:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="364" height="86" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM.png" alt="Screen Shot 2026-03-03 at 9.01.38 PM" class="wp-image-196516" style="width:224px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM.png 364w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-300x71.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-24x6.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-36x9.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.01.38-PM-48x11.png 48w" sizes="auto, (max-width: 364px) 100vw, 364px" /></figure>



<p>However, the following example demonstrates this approach is not sufficient to guarantee the integrity at position level. The reason is this condition tests a certain quantile of the pseudorange error distribution, whereas the stability by linear combinations require criteria to be met across the entire distribution.</p>



<p>Let us use a numerical counterexample. We first take a geometry matrix (here corresponding to 7 GPS satellites above Toulouse&nbsp;&nbsp;on September 3, 2002, 0h00 in ENU frame)</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="892" height="280" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM.png" alt="Screen Shot 2026-03-03 at 9.03.30 PM" class="wp-image-196517" style="aspect-ratio:3.1857777777777776;width:519px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM.png 892w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-300x94.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-768x241.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-36x11.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.03.30-PM-48x15.png 48w" sizes="auto, (max-width: 892px) 100vw, 892px" /></figure>



<p>Let us consider the case where all error variances on the pseudorange errors σ_i^2 are equal to 1. Then we build the S matrix as S=(G^T G)^(-1) G^T. The third line of S is</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="64" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-1024x64.png" alt="Screen Shot 2026-03-03 at 9.05.00 PM" class="wp-image-196518" style="width:528px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-1024x64.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-768x48.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.05.00-PM.png 1032w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>The vertical protection volume VPL has radius given by Equation 69</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="57" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-1024x57.png" alt="Screen Shot 2026-03-03 at 9.06.35 PM" class="wp-image-196519" style="aspect-ratio:17.97993311036789;width:647px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-1024x57.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-300x17.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-768x43.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.06.35-PM.png 1402w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>with K_V=5.33 and σ_V=√(S_(3,i)^2 σ_i^2 )</p>



<p>If the vector of residual errors is</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="484" height="64" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM.png" alt="Screen Shot 2026-03-03 at 9.07.45 PM" class="wp-image-196520" style="width:310px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM.png 484w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-300x40.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.07.45-PM-48x6.png 48w" sizes="auto, (max-width: 484px) 100vw, 484px" /></figure>



<p>then each line of sight passes the integrity test (meaning that ∀i,b_i&lt;K_V σ_i=5.33), but the vertical error is</p>



<figure class="wp-block-image size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="54" src="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-1024x54.png" alt="Screen Shot 2026-03-03 at 9.09.01 PM" class="wp-image-196521" style="width:550px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-1024x54.png 1024w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-300x16.png 300w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-768x41.png 768w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM-48x3.png 48w, https://insidegnss.com/wp-content/uploads/2026/03/Screen-Shot-2026-03-03-at-9.09.01-PM.png 1394w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>



<p>which exceeds the protection level radius.</p>



<p>This counter-example does not question the principle of integrity transfers from pseudo distance to position, but the fact that it can be done by the sole definition of confidence intervals in the pseudo distance domain. To establish the equivalence between both realms, the property of overbounding must be verified across the entire distribution, at least up to the desired quantile.</p>



<p>Indeed, if the overbound is applicable for each line of sight, it is extremely improbable to obtain the vector&nbsp;<img loading="lazy" decoding="async" width="6" height="14" src="blob:https://insidegnss.com/4b4ea743-aa06-4ee8-bf84-af1959e74891">&nbsp;proposed in the example. In addition, if we only know the inequality is satisfied for each line of sight, we have no information about the probability of occurrence of the given vector&nbsp;<img loading="lazy" decoding="async" width="6" height="14" src="blob:https://insidegnss.com/4b4ea743-aa06-4ee8-bf84-af1959e74891">&nbsp;in the example, even though it leads to a lack of integrity in the domain of positions.</p>



<h3 class="wp-block-heading" id="h-references">References </h3>



<p>[1]&nbsp;Minimum operational performance standards for Global positioning system/ wide area augmentation system airborne equipment, DO-229, RTCA ed. Washington, DC.</p>



<p>[2] B. DeCleene, Defining pseudorange integrity &#8211; Overbounding, In Proc. 13th Int. Techn. Meeting Satellite Div. Inst. Navigat., Salt Lake City, UT, USA, Sep. 2000, pp. 1916–1924.</p>



<p>[3] J. Rife , S. Pullen, B. Pervan, and P. Enge, Paired Overbounding and Application to GPS Augmentation, Proceedings IEEE Position, Location and Navigation Symposium, pp. 439-446, July 2004.</p>



<p>[4] J. Rife, S. Pullen, B. Pervan, and P. Enge, Paired Overbounding for Nonideal LAAS and WAAS Error Distributions, IEEE Trans. Aerosp. Electron. Syst., vol. 42, no. 4, pp. 1386–1395, Oct. 2006.</p>



<p>[5] J. Rife, J. Blanch and T. Walter, Overbounding SBAS and GBAS Error Distributions with Excess-Mass Functions, in Proceedings of the GNSS 2004 Internat. Symp. On GNSS/GPS, Sydney, Australia,6-8, Dec. 2004.</p>



<p>[6] J. Rife, S. Pullen, B. Pervan, Core Overbounding and its Implications for LAAS Integrity, Proceedings of the 17th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS 2004), Long Beach, CA, Sept. 2004, pp. 2810-2821.</p>



<p>[7] J. Blanch, T. Walter and P. Enge, Gaussian Bounds of Sample Distributions for Integrity Analysis, IEEE Trans. Aerosp. Electron. Syst., vol. 55, no. 4, pp 1806-1815, Aug. 2019.</p>



<p>[8] M. Earnest,&nbsp;<a href="https://math.stackexchange.com/a/70659">link</a>.</p>



<p>[9]&nbsp;J. Antic, O. Maliet, and S. Trilles, &#8220;SBAS Protection Levels with Gauss-Markov K-Factors for Any Integrity Target&#8221;; NAVIGATION: Journal of the Institute of Navigation September 2023, 70 (3) navi.594</p>



<p>[10] K. Mimouni, O. Maliet, J. Antic,&nbsp;&#8220;A simple and robust K-factor computation for GNSS integrity needs&#8221;.&nbsp;ION plan, pp 399-407, 2023</p>



<p>[11] Maliet, O., Mimouni, K., Antic, J., &amp; Trilles, S. (2025). Wide-Sense CDF overbounding for GNSS integrity.&nbsp;NAVIGATION: Journal of the Institute of Navigation June 2025, 72 (2) navi.697;&nbsp;<a href="https://doi.org/10.33012/navi.697">link</a></p>



<p>[12] Langel, S., Crespillo, O. G., &amp; Joerger, M. (2020, April). “A new approach for modeling correlated Gaussian errors using frequency domain overbounding”. In 2020 IEEE/ION Position, Location and Navigation Symposium (PLANS) (pp. 868-876). IEEE.</p>



<p>[13] I. Nikiforov, “From pseudorange overbounding to integrity risk overbounding”, NAVIGATION, Vol 66, Issue 2, Summer 2019, pp 417-439.<strong></strong></p>



<p>[14] Z. W. Birnbaum, “On Random Variables with Comparable Peakedness”, The Annals of Mathematical Statistics, 19 (1), pp 76-81&nbsp;<a href="https://doi.org/10.1214/aoms/1177730293" target="_blank" rel="noreferrer noopener">doi:10.1214/aoms/1177730293</a><strong></strong></p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Julie Antic</strong>&nbsp;is a specialist in GNSS integrity algorithms and performances at Thales Alenia Space in Toulouse, France. She holds a Ph.D. in probability and Statistics from Paul Sabatier University, France, as well as an engineering degree in applied Mathematics from INSA in Toulouse, France. Her areas of activity include advanced GNSS augmentation systems for high accuracy and integrity, advanced receiver autonomous integrity monitoring and overbounding concepts.</p>



<p><strong>Odile Maliet</strong>&nbsp;graduated from École Polytechnique and received her Ph.D. degree in Macroevolution from École Normale Supérieure (ENS), Paris in 2018. Between 2018 and 2020, she worked as a postdoc on the use of Bayesian techniques on phylogenetics empirical data at ENS, Paris. Since 2021 she has worked on integrity concepts in Advanced Projects at the Performance and Processing Department of Navigation Domain, Thales Alenia Space.</p>



<p><strong>Kin Mimouni</strong>&nbsp;graduated from École Polytechnique, Paris, and received his Ph.D. in Theoretical Physics from École Polytechnique Fédérale de Lausanne (EPFL) in 2019. Since 2021 he has worked on GNSS algorithms and integrity concepts, first as a post-doc in the Télécommunications Spatiales et Aéronautiques (TéSA) laboratory in Toulouse, and since 2023 as an engineer in Advanced Projects at the Performance and Processing Department of Navigation Domain France, Thales Alenia Space.</p>



<p><strong>Sébastien Trilles</strong>&nbsp;is an expert in orbitography and integrity algorithms at Thales Alenia Space in Toulouse, France. He holds a Ph.D. in Pure Mathematics from the Paul Sabatier University and an advanced master’s degree in Space Technology from ISAE-Supaero. He heads the Performance and Processing Department where high precise algorithms are designed as orbit determination, clock synchronization, time transfer, reference time generation, integrity and ionosphere modeling algorithms for GNSS systems and augmentation.</p>
<p>The post <a href="https://insidegnss.com/overview-of-overbounding-techniques-for-integrity-purposes/">Working Papers: Overview of Overbounding Techniques for Integrity Purposes</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Linking GNSS Data to UTC</title>
		<link>https://insidegnss.com/linking-gnss-data-to-utc/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 18:52:26 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[timing]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196371</guid>

					<description><![CDATA[<p>The methods used to establish traceability of the timing data processed by a GNSS receiver to Coordinated Universal Time (UTC), and the role...</p>
<p>The post <a href="https://insidegnss.com/linking-gnss-data-to-utc/">Linking GNSS Data to UTC</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>The methods used to establish traceability of the timing data processed by a GNSS receiver to Coordinated Universal Time (UTC), and the role calibrating the delay in the user’s receiving and processing equipment plays in realizing this traceability.</em></p>



<span id="more-196371"></span>



<p><strong>JUDAH LEVINE</strong>, UNIVERSITY OF COLORADO, <strong>PASCALE DEFRAIGNE</strong>, ROYAL OBSERVATORY OF BELGIUM, <strong>ILARIA SESIA</strong>, ITALIAN METROLOGY INSTITUTE, <strong>GIULIO TAGLIAFERRO</strong>, INTERNATIONAL BUREAU OF WEIGHTS AND MEASURES, <strong>MICHAEL WOUTERS, </strong>NATIONAL MEASUREMENT INSTITUTE</p>



<p>Coordinated Universal Time (UTC) has been recommended as the unique time scale for international reference time stamps and is the basis for civil time in most countries [1]. Time zones, which are established by local administrations, are defined by an offset from UTC. Some applications are required to use time stamps based on UTC either by regulation or by statute [2-4]. There are advantages to the use of time stamps based on UTC, even when it is not required to do so, because this facilitates combining data from multiple sources or when international coordination is important.</p>



<p>Time signals from global navigation satellite systems (GNSS) are widely used as the reference time in many applications, and it is important to understand the requirements that ensure GNSS time stamps are traceable to UTC from both a technical and a regulatory perspective [5]. This article describes how UTC is defined and realized and how a prediction of UTC is included in GNSS data transmissions.</p>



<h3 class="wp-block-heading" id="h-the-definition-and-realization-of-utc-nbsp">The Definition and Realization of UTC&nbsp;</h3>



<p>The UTC time scale is a paper time scale that has no physical realization. It is computed monthly by the International Bureau of Weights and Measures (BIPM) based on data from several hundred atomic clocks located at National Metrology Institutes (NMIs) and other time centers in various countries. Many laboratories operate local ensembles of atomic clocks and use the data from these ensembles to compute and disseminate a local UTC estimate. This local estimate is identified as UTC(k), where k is the acronym for the laboratory. The estimate of UTC computed by the U.S. Naval Observatory (USNO) is UTC(USNO) and the estimate computed by the National Institute of Standards and Technology (NIST) is UTC(NIST).&nbsp;</p>



<p>The computation of UTC for any month is published in BIPM Circular T by the tenth day of the following month [6]. This circular tabulates UTC-UTC(k) every five days for every participating laboratory. A rapid version of UTC, called UTCr [7], is also published by the BIPM every Wednesday. It lists daily values of UTCr-UTC(lab) through the previous Sunday. These data are published on the BIPM website and are distributed by email&nbsp;<strong>(Figures 1 and 2).&nbsp;</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1164" height="924" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM.png" alt="Screenshot 2026-02-11 at 5.43.07 PM" class="wp-image-196372" style="aspect-ratio:1.2597539543057996;width:518px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM.png 1164w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-300x238.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-1024x813.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-768x610.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-24x19.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-36x29.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.07-PM-48x38.png 48w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-gnss-time-signals">GNSS Time Signals</h3>



<p>The system time of a GNSS constellation, GNSS_T, is generated by the ground segment from an ensemble of clocks located on the ground at the control center and tracking stations. It also can include the clocks in the satellites [8-11]. Each satellite in a constellation transmits a prediction of the offset between the time of the clock on the satellite and the system time of the constellation, which is uploaded to the satellites periodically. GNSS constellations also broadcast bUTC_GNSS, a prediction of the difference between GNSS_T and UTC (including a 3-hour offset for the GLONASS system) that is derived from the UTC prediction of timing laboratories. This prediction is transmitted in two parameters: an integer giving number of whole seconds difference between UTC and the GNSS system time, and a fractional part, which specifies the difference modulo 1 s. The first parameter changes only when a leap second is inserted into UTC and not at other times. (The GLONASS constellation uses UTC as the system time so only the fraction is transmitted in the navigation message.)</p>



<p>For the GPS constellation, this prediction is derived from UTC(USNO) maintained at the U.S. Naval Observatory. The GLONASS constellation broadcasts a prediction based on UTC(SU), which is realized at the Russian Metrology Institute of Technical Physics and Radio Engineering (FSUE, VNIFTRI). The Galileo constellation uses a prediction derived from a collaboration of five European National Metrology Institutes. The BeiDou system uses UTC(NTSC) realized at the National Time Service center of China and UTC(NIM) realized at the China National Institute of Metrology. Regional systems also broadcast similar messages. The formats of the respective messages are GNSS-specific and are documented in the respective Interface Control Documents.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="916" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM.png" alt="Screenshot 2026-02-11 at 5.43.13 PM" class="wp-image-196373" style="aspect-ratio:1.2751120703968122;width:539px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-300x235.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-1024x803.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-768x602.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-24x19.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-36x28.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.13-PM-48x38.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-the-role-of-the-bipm">The Role of the BIPM</h3>



<p>In addition to computing UTC and publishing the differences of UTC-UTC(k), the BIPM evaluates the difference between UTC and the predictions of UTC broadcast by the various GNSS constellations, bUTC_GNSS. These differences are published in Section 4 of BIPM circular T [6]. This section lists the difference in ns between UTC computed by the BIPM and the prediction of UTC transmitted by the GPS, GLONASS, Galileo and BeiDou satellites for every day in the monthly reporting period for that issue of Circular T.&nbsp;<strong>Table 1&nbsp;</strong>shows the values from the August 2025 editor of Circular T interpolated from the five-day reporting interval in Circular T to a daily value at 0 UTC [12].&nbsp;</p>



<h3 class="wp-block-heading" id="h-linking-user-equipment-to-utc">Linking User Equipment to UTC</h3>



<p>There are two common configurations that support a link between the user’s time reference and UTC(k) or UTC. In the first configuration, the user has a clock (or an ensemble of clocks) that provides the reference signal for a GNSS timing receiver. The receiver does not discipline the free-running local clock (or ensemble) in the short term, but measures its time with respect to the signal broadcast by the satellites of some constellation. These data are combined with the data in the navigation message to (1) correct for the transit time between the satellite and the receiver, (2) include the offset between the satellite clock and the GNSS system time, and (3) add the prediction of the offset between the system time and UTC.&nbsp;</p>



<p>Most receivers can be configured to implement these calculations in firmware, and the output data gives the difference between the local reference and the broadcast prediction of UTC. The signal from this clock (or clock ensemble) can be used in the user’s application or the application’s clock can be compared to it. The system connected to the GNSS receiver may be completely free-running and not disciplined by the GNSS data; its offset is recorded and used to adjust the downstream data. In some configurations, the time or frequency of the local reference clock is adjusted from time to time so the measured time difference is kept within some administratively defined tolerance. The interval between adjustments depends on this tolerance and on the frequency stability of the local reference, and it can range from minutes for a rubidium-based reference to hours or days for a cesium-based device.&nbsp;</p>



<p>The second configuration, which is much more common, combines a GNSS receiver and an oscillator in a single device. There are many commercial systems that realize this configuration and often provide several outputs (5 MHz, 10 MHz and 1 pps) that are disciplined by the data received from the GNSS constellation. The simpler systems use the code data transmitted on the L1 frequency, but dual-frequency receivers and more sophisticated carrier-phase analyses are possible. The first GNSS disciplined oscillators usually used signals from the GPS constellation, but newer systems can track satellites from more than one constellation simultaneously. The output signal might be based on only the satellites from one constellation at any time or on a combination of the data received from multiple constellations. Either solution can produce significant steps in the output signals, especially in the PPS data, when the reference constellation changes. The details of the disciplining algorithm are often proprietary; the output could be disciplined to GNSS system time or to the prediction of UTC, and traceability to UTC would require the additional adjustment that incorporated the data published in BIPM Circular T. This additional adjustment, based on data from Circular T, may be small enough to ignore in some applications.&nbsp;</p>



<p>The first configuration is more flexible; the measurement process can accept data from multiple sources, including common-view data, and implement more sophisticated post-processing methods. The adjustment process for the local reference clock can be adjusted to meet the requirements of the user’s application. The second configuration, on the other hand, may provide adequate performance in many applications. It is much simpler to operate, and this simplicity may be the deciding factor for many users.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="874" height="1294" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM.png" alt="Screenshot 2026-02-11 at 5.43.28 PM" class="wp-image-196374" style="aspect-ratio:0.67542779606503;width:575px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM.png 874w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-203x300.png 203w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-692x1024.png 692w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-768x1137.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-16x24.png 16w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-24x36.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.43.28-PM-32x48.png 32w" sizes="auto, (max-width: 874px) 100vw, 874px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-combining-data-from-multiple-constellations"><span style="font-size: revert;">Combining Data from Multiple Constellations</span></h3>



<p>Combining GNSS signals from multiple constellations can significantly improve the timing performance of a user’s receiver, especially in locations with limited visibility of the sky. This approach requires a knowledge of the offsets between different GNSS time scales, which are at the level of a few ns and vary in time. It is possible for a user to solve for the inter-system bias between constellations [13] if enough satellites from both constellations are visible at the same time, but this is not always the case, and the broadcast values must be used [14]. The broadcast of the predicted time difference between each GNSS system time and UTC greatly simplifies the job of combining signals from multiple constellations when only broadcast data are available. The use of UTC as the common reference time scale eliminates the need for maintaining multiple inter-system bias values.</p>



<h3 class="wp-block-heading" id="h-metrological-traceability">Metrological Traceability</h3>



<p>The International Vocabulary of Metrology (VIM) defines traceability as the “property of a measurement result whereby the result can be related to a reference through a documented unbroken chain of calibrations, each contributing to the measurement uncertainty” [15]. The International Telecommunications Union (ITU) [16] and the International Laboratory Accreditation Conference adopted the same definition and refer to the International Organization for Standardization (ISO/IEC) standard 17025 [17].</p>



<p>The signals transmitted by the GNSS constellations can be traceable to UTC. The broadcast signals are linked to UTC through the UTC(k) data of a timing laboratory, and the transmissions are monitored by the BIPM with results published in Circular T. A user can also establish a common-view relationship with a timing laboratory, which can provide a near-real-time estimate of the offset of the user’s timing system with respect to the UTC(k) of that laboratory. In either case, these data are processed by the receiving system at the user’s site, and the calibration and statistical characteristics of this system directly affect the accuracy and stability of the timing data that control the user’s application.&nbsp;</p>



<h3 class="wp-block-heading" id="h-timing-receiver-calibration">Timing Receiver Calibration</h3>



<p>The calibration of the user’s equipment that is required to complete the demonstration of traceability should be performed by a method validated by a National Metrology Institute or a Designated Institute that participates in the Mutual Recognition Agreements (MRA) and have their Calibration and Measurement Capabilities (CMC) published in the Key Comparison Database maintained by the BIPM [18]. The Key Comparison Database maintains the equivalency between different organizations and guarantees the international acceptance of calibrations performed by different agencies that participate in the MRA.</p>



<p>The manufacturer’s published specifications can be the basis for specifying the performance of a stand-alone GNSS receiver or a GNSS receiver and disciplined oscillator combination. These specifications should be based on a calibration of one example of a particular model with some allowance for the variation among devices of the same type. For applications that require only modest accuracy (not greater than about 1 µs) a statement by the manufacturer that the device has been type-approved to that level is sufficient. The transmission delay even through a very long antenna cable is unlikely to invalidate this assumption.</p>



<p>The use of “type approval” may not be adequate for applications that require sub-microsecond accuracy. One method of calibrating a receiving system is to compare the output of the system to a source of UTC(k) by using a time-interval counter to monitor the difference. This method depends on an independent source of UTC(k), which might be provided by a traveling calibrated receiver, by transporting a running clock from the UTC(k) source to the location of the receiver, or by operating the device to be calibrated at a laboratory where a source of UTC(k) is available.&nbsp;</p>



<p>Using a traveling receiver is the best choice because it tests the receiving hardware with the antenna and cables in the environment where it will be used. The BIPM uses this option to calibrate the time-transfer equipment at timing laboratories. Although the traveling receiver is calibrated, it is operated at a location where its position may not be known accurately, and where it may be influenced by multipath effects that are not the same as the effects on the device under test. These considerations are usually not important unless the required accuracy must be better than about 50 ns.</p>



<p>A calibration based on carrying a running clock from the source of UTC(k) to the location of the user’s equipment is feasible if the distance is not too great and the required calibration accuracy is not too high. For example, the GPS receivers at the NIST radio station in Fort Collins, Colorado, are calibrated by carrying a rubidium oscillator from the source of UTC(NIST) in Boulder to Fort Collins, a distance of about 100 km by road. The calibration is repeated by carrying a calibrated GPS receiver between the two locations. The accuracy of either method is estimated to be about 15 ns, and the two methods agree within this uncertainty.</p>



<p>Transporting the device under test to a location where an independent source of UTC(k) is available is usually the most difficult solution. It may be impractical to disconnect the antenna cable at the site, so a different cable must be used for the calibration. The delay through the actual cable can be estimated with a time domain reflectometer, but this method tests the cable with signals that are not the same as signals from real satellites. The impedances at the end-points are also different.&nbsp;</p>



<p>If the system to be calibrated provides the contribution of each satellite in view to the composite output, then the common-view method can be used to calibrate the receiver. (Unfortunately, many disciplined oscillators do not provide these data.) The system to be calibrated measures the difference between the local clock (or clock ensemble) and the system time of the constellation by using the data from each satellite in view. These data are compared, satellite by satellite, with the same measurements made at a location where UTC(k) is available. The common-view difference cancels or attenuates the contributions of the satellite clock and the orbital&nbsp;parameters, which are common to both data sets and cancel in the differences in first order. If the distance between the locations of the user and the UTC(k) laboratory is not too great, the contribution of the ionosphere may also be common to both measurements and cancel in the difference. A multiple-frequency measurement, which can correct for the contribution of the ionosphere, may not offer a significant improvement over a simple L1 comparison in this configuration, because the contribution of the ionosphere will be cancelled or attenuated in the common-view subtraction. The common-view method can operate continuously, and can also monitor the stability of the remote system.</p>



<h3 class="wp-block-heading" id="h-frequency-calibration">Frequency Calibration</h3>



<p>The techniques described for timing calibration can also calibrate the output frequency of the user’s system. A frequency calibration can be easier to realize than a time calibration because the absolute values of the delays in the equipment are not important, only the stability of these delays is. The stability of the output frequency of a quartz oscillator may be degraded by fluctuations in the ambient temperature, and the frequency estimated with a reference based on a rubidium or cesium device may be degraded by changes in the multipath contribution.</p>



<h3 class="wp-block-heading" id="h-specific-recommendations">Specific Recommendations</h3>



<p>The documentation from the manufacturer is the best source of information about a particular device. The following specifications provide general guidance on the methods to establish traceability [19].</p>



<p><strong>1.</strong>&nbsp;If the application can accept a fractional frequency uncertainty of 10<sup>-8</sup>&nbsp;or greater with an averaging time of one day, or a time uncertainty of 1 µs or greater, then a certificate by the manufacturer that at least one unit of the model satisfies the requirement is adequate to establish traceability at this level. (A receiver used only as the reference for a server that supports NTP, the Network Time Protocol, may not require calibration, because the accuracy and stability of the NTP service is usually limited to not better than about 1 ms by the characteristics of the network connection between the server and the client systems.)&nbsp;</p>



<p><strong>2.</strong>&nbsp;If the application requires a fractional frequency uncertainty between 10<sup>-8</sup>&nbsp;and 10<sup>-10</sup>&nbsp;with an averaging time of one day or a time uncertainty between 100 ns and 1 µs, then the manufacturer should provide a certificate with every unit that satisfies the requirement. The manufacturer could validate the performance of each unit by comparing its output with a calibrated reference unit maintained at the manufacturer’s facility.&nbsp;</p>



<p><strong>3.</strong>&nbsp;If the application requires a fractional frequency uncertain of less than 10<sup>-10</sup>&nbsp;with an averaging time of one day or a time uncertainty of less than 100 ns, then the calibration can be challenging and should be performed at the user’s facility, if possible.&nbsp;</p>



<p><strong>4.</strong>&nbsp;If the application requires a fractional frequency stability of less than 10<sup>-12</sup>&nbsp;or a time uncertainty of less than 50 ns, then the calibration should be repeated periodically or the performance of the system should be monitored by common-view or an equivalent technique, which will require a dedicated GNSS timing receiver at the user’s site. The contributions of multipath reflections and the sensitivity of the equipment to fluctuations in the ambient temperature may be important. The impact of multipath reflections can be minimized by locating the antenna so it has an unobstructed view of the sky, and by using a directional “choke ring” antenna, which attenuates signals coming from low elevations. The sensitivity to fluctuations in the ambient temperature may be a problem if the local reference device is a simple quartz oscillator or if a long antenna cable is exposed to direct sunlight.&nbsp;</p>



<p>It is important to maintain documentation that validates the traceability of any system. Configurations that support this capability are particularly useful.</p>



<h3 class="wp-block-heading" id="h-summary-and-conclusion">Summary and Conclusion</h3>



<p>Applications that use the timing data from GNSS systems often require legal and technical traceability to UTC. Even when traceability is not legally required, maintaining traceability to UTC simplifies combining the data from multiple constellations. The signals transmitted by GNSS systems are monitored by the BIPM and can be made traceable to UTC by the methods discussed. Ensuring the traceability of the timing data in a user application also depends on a calibration of the receiving equipment. The methods for realizing this calibration were presented and specific recommendations provided. Maintaining adequate documentation is important, and configurations that support real-time monitoring and log files are particularly useful.&nbsp;</p>



<h3 class="wp-block-heading" id="h-references-nbsp">References&nbsp;</h3>



<p><strong>(1)&nbsp;</strong>Conference generale des poids et mesures (CGPM) 2018 Resolution 2 of the 26th CGPM (2018), on the definition of time scales (https://bipm.org/en/committees/cg/cgpm/26-2018)</p>



<p><strong>(2)&nbsp;</strong>MiFiR RTS 25: https://ec.europa.eu/finance/securities/docs/isd/mifid/rts/160607-rts-25_en.pdf</p>



<p><strong>(3)&nbsp;</strong>Finra Rule 6820: https://www.finra.org/rules-guidance/rulebooks/finra-rules/6820</p>



<p><strong>(4)&nbsp;</strong>IEEE Standard for Synchrophasor Measurement for Power Systems, IEEE C37.118.1-2011. https://standards.ieee.org/ieee/C37.118.1/4902.</p>



<p><strong>(5)&nbsp;</strong>Dimetrios Matsakis, Judah Levine, and Michael Lombardi, Metrological and Legal Traceability of Time Signals, Inside GNSS, March/April 2019, pp. 48-58.</p>



<p><strong>(6)&nbsp;</strong>https://www.bipm.org/en/time-ftp/circular-t</p>



<p><strong>(7)&nbsp;</strong>https://www.bipm.org/en/time-ftp/utcr</p>



<p><strong>(8)&nbsp;</strong>GPS system time: https://www.gps.gov/applications/timing</p>



<p><strong>(9)&nbsp;</strong>Galileo system time: https://www.gsc-europa.eu/GST</p>



<p><strong>(10)&nbsp;</strong>GLONASS system time: https://www.unoosa.org/documents/pdf/icg/2020/GLONASS_Time_2017_E.pdf</p>



<p><strong>(11)&nbsp;</strong>BeiDou system time: http://en.beidou.gov.cn/SYSTEMS/Officialdocument/202001/P020231201549662978039.pdf</p>



<p><strong>(12)&nbsp;</strong>https://webtai.bipm.org/ftp/pub/tai/other-products/notes/explanatory_supplement_v0.8.pdf</p>



<p><strong>(13)&nbsp;</strong>G. Huang, Q. Zhang, W. Fu and G. Guo, GPS/GLONASS time offset monitoring based on combined precise point positioning approach, Advances in Space Research, Vol. 55, number 12, 15 June 2015, pp. 2950-2960. DOI: https://doi.org/10.1016/j.asr.2015.03.003. See also references in that text.</p>



<p><strong>(14)&nbsp;</strong>GPS-Galileo Time Offset (GGTO): https://www.unoosa.org/documents/pdf/icg/2017/wgd/wgd4-2-2.pdf</p>



<p><strong>(15)&nbsp;</strong>https://www.bipm.org/documents/20126/54295284/VIM4_CD_210111c.pdf</p>



<p><strong>(16)&nbsp;</strong>ITU-R, TF-686-3, Glossary and Definitions of Time and Frequency Terms p 16. https://www.itu.int/dms_pubrec/itu-r/rec/tf/r-rec-tf.686-3-201312-i!!pdf-e.pdf</p>



<p><strong>(17)&nbsp;</strong>SO 17025:2017, General requirements for the competence of testing and calibration laboratories, https://www.iso.org/ISO-IEC-17025-testing-and-calibration-laboratories.html</p>



<p><strong>(18)&nbsp;</strong>https://www.bipm.org/en/cipm-mra</p>



<p><strong>(19)&nbsp;</strong>P. Defraigne, J. Achkar, M. J. Coleman, M. Gertsvolv, R. Ichikawa, J. Levine, P. Uhrich, P. Whibberley, M. Wouters and A. Bauch, Achieving traceability to UTC through GNSS measurements, Metrologia, vol. 59, Number 6, October 2022. Metrologia, 59, 064001. DOI: 10.1088/1681-7575/ac98cb.</p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Judah Levine</strong>&nbsp;is on the faculty of the Department of Physics at the University of Colorado at Boulder. He recently retired from the Time and Frequency Division of NIST, where he worked on time scales and methods of distributing time and frequency information. He is continuing those projects at the University and is also a member of committees of the International Bureau&nbsp;<br>of Weights studying the future of Coordinated Universal Time and possible time scales for the Moon.</p>



<p><strong>Pascale Defraigne</strong>&nbsp;obtained her Ph.D. in Geophysics in 1995 at the Université Catholique de Louvain. Since 1997, she has managed the time and frequency activities at the Royal Observatory of Belgium, where the Belgian reference UTC (ORB) is maintained. Her research activities mainly concern the use of satellite navigation systems for time and frequency transfer. Pascale presently chairs the CCTF working group on GNSS time transfer, and contributes to the validation of Galileo timing signals.</p>



<p><strong>Ilaria Sesia</strong>&nbsp;is a Senior Researcher and Head of the Time and Frequency Department at INRiM, where she works on time transfer, atomic clocks and time scales for satellite applications. Since 2004, she has been deeply involved in the design and development of the timing aspects of the Galileo System.</p>



<p><strong>Giulio Tagliaferro&nbsp;</strong>received his Ph.D. in 2021 from Politecnico di Milano on precise GNSS measurement adjustment. He is currently a physicist at BIPM, where he works on GNSS time-transfer activities and receiver calibration supporting the realization of UTC.</p>



<p><strong>Michael Wouters</strong>&nbsp;leads the time and frequency group at the National Measurement Institute in Sydney, Australia. His research focuses on using low-cost GNSS receivers for time-transfer. He chairs the Consultative Committee on Time and Frequency&#8217;s task group working on the traceability of GNSS timing signals to UTC.</p>



<p></p>
<p>The post <a href="https://insidegnss.com/linking-gnss-data-to-utc/">Linking GNSS Data to UTC</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Precision Ag: From Field to Furrow</title>
		<link>https://insidegnss.com/from-field-to-furrow/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 17:17:11 +0000</pubDate>
				<category><![CDATA[agriculture]]></category>
		<category><![CDATA[Autonomous Vehicles]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196368</guid>

					<description><![CDATA[<p>How Analog Devices brings inertial discipline to precision agriculture.  Agriculture has entered the era of continuous PNT. Precision agriculture is moving toward full...</p>
<p>The post <a href="https://insidegnss.com/from-field-to-furrow/">Precision Ag: From Field to Furrow</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>How Analog Devices brings inertial discipline to precision agriculture. </em></p>



<span id="more-196368"></span>



<p>Agriculture has entered the era of continuous PNT.</p>



<p>Precision agriculture is moving toward full automation. Guidance systems once treated GNSS as the entire solution; today, the industry recognizes that satellite signals are necessary but insufficient. Farms have become complex RF environments. Tree canopy, terrain, outbuildings, seasonal geometry shifts, multipath near grain elevators, interference from adjacent equipment, and the simple reality that tractors roam in and out of open-sky visibility all challenge the idea that GNSS alone can sustain continuity.</p>



<p>OEMs are building guidance systems that must keep machines on path even when GNSS falters. Autonomy depends on uninterrupted perception of position, velocity and attitude. That means pairing GNSS with inertial systems engineered for agricultural machines, not adapted from other domains.</p>



<p>In a recent conversation with&nbsp;<em>Inside GNSS,</em>&nbsp;Tzeno Galchev, Director, Product Marketing and Applications Engineering for Analog Devices, Inc. (ADI), described how their inertial measurement units (IMUs) are being integrated into next-generation tractors, implements, drones and robotics platforms. ADI’s engineers are focused on what really matters in the field: disciplined inertial performance, controlled lifetime drift, rugged packaging and reliable sensor fusion with GNSS. The message was unambiguous: Autonomy in agriculture can scale rapidly when inertial becomes a baseline requirement.&nbsp;</p>



<h3 class="wp-block-heading" id="h-the-market-reality-why-inertial-matters-now">The Market Reality: Why Inertial Matters Now </h3>



<p>Precision agriculture has matured beyond the first decade of “straight-line” GNSS guidance. Machines now operate in a wider set of field geometries, crop types and environmental constraints. Several forces are converging:</p>



<p>Tractors are evolving from operator-assisted systems to autonomy-ready platforms. Implements are following, including precision planters, high-clearance sprayers, and robotic harvesters. Each requires continuous PNT. A single GNSS dropout during an autonomous end-of-row turn can result in overlap, missed coverage or unsafe behavior.</p>



<p>Agriculture spans open sky areas and GNSS-hostile corridors. Machines pass under tree rows, within orchard canopies, beside barns or silos, or along field edges lined with windbreaks. Modern high-value crops, such as vineyards, orchards and berries, introduce dense canopy that disrupts L-band signals. Even row crops can create directional multi-path in late summer.</p>



<p>OEM Pressure to Deliver “Always-on” Paths</p>



<p>Agricultural OEMs face customer expectations shaped by the automotive sector. The question is no longer whether GNSS can deliver accuracy; it is whether the total system delivers continuity. That continuity is now a competitive differentiator. Dead-reckoning performance, not positional Root Mean Square (RMS) in open sky, shapes the user experience.</p>



<h3 class="wp-block-heading" id="h-cost-realism-and-the-mid-market-explosion">Cost Realism and the Mid-Market Explosion</h3>



<p>Farm sizes vary globally. Not every user can justify aerospace-tier inertial systems. ADI’s view is that precision agriculture needs inertial performance that respects cost boundaries while still meeting the dynamics of field machinery: vibration, temperature cycling and shock.</p>



<p>“The demand is there because there’s a shortage of workforce, especially in the developed countries, and these machines make a considerable difference in the cost and efficiency of farming operations,” Galchev said. “They are replacing and reducing the number of workers needed as well as putting workers out of harm’s way.”&nbsp;</p>



<h3 class="wp-block-heading" id="h-the-shift-to-autonomy-grade-attitude-estimation">The Shift to Autonomy-Grade Attitude Estimation</h3>



<p>GNSS provides position and velocity; but many operations require continuous knowledge of roll, pitch and yaw. Sprayers use boom leveling. Planters need implement attitude to maintain depth accuracy. Drones require stable orientation in low-signal environments. INS establishes those states even when GNSS is degraded.</p>



<p><strong>THE RESULT:</strong>&nbsp;GNSS remains the reference, but inertial is now the mechanism that closes the reliability gap.</p>



<h3 class="wp-block-heading" id="h-inertial-basics-for-agricultural-platforms-nbsp">Inertial Basics for Agricultural Platforms&nbsp;</h3>



<p>Agricultural operators rarely see inertial systems directly. They see better lines, fewer skips, improved boom stability, and smoother turns. Under the hood:</p>



<p>• IMUs measure angular rate and acceleration along orthogonal axes.</p>



<p>• Sensor fusion in an inertial navigation system (INS) uses those measurements to propagate position, velocity and attitude during GNSS gaps.</p>



<p>• Drift is inherent, but it can be minimized, modeled and constrained with well-tuned sensor fusion.</p>



<p>• GNSS resets the INS, bounding cumulative error.</p>



<p>• Agricultural use-cases emphasize short-to-medium duration bridging, not long-haul independent navigation.</p>



<p>Modern MEMS technology has reduced noise, bias instability, and temperature sensitivity to levels appropriate for automotive-grade and robotic applications. ADI’s work has focused on improving consistency across production units, strengthening environmental robustness, and integrating compensation routines at the firmware level.</p>



<p>Agricultural machinery introduces several complicating factors that inertial systems must handle cleanly:</p>



<p>• High vibration environments from diesel engines, tillage tools, and PTO-driven implements.</p>



<p>• Complex motion during headland turns, uneven terrain and differential traction events.</p>



<p>• Thermal swings, from dawn cold starts to midday heat.</p>



<p>• Mechanical shock, especially on implements.</p>



<p>• Long duty cycles, including 14 to 18 hour days in planting or harvest season.</p>



<p>This environment is less deterministic than automotive and more dynamic than many robotics platforms. The IMU/INS must treat vibration as a feature of the mission, not a source of error.</p>



<h3 class="wp-block-heading" id="h-adi-s-technical-approach">ADI’s Technical Approach</h3>



<p>ADI designs inertial solutions with a focus on predictable error behavior, rugged packaging and stable sensor fusion. The company emphasizes several technical principles:</p>



<p><strong>VIBRATION TOLERANCE.</strong>&nbsp;Farm machinery produces persistent broadband vibration. ADI considers how vibration intrinsically disturbs the sensors and ADI engineers design mechanical structures that better suppress, cancel and otherwise reduce the effect of vibration directly into the MEMS structures themselves because once vibration is allowed to pollute the sensor signal, it is too late for the INS system to do anything about it. This ensures the INS maintains the correct angular-rate and acceleration signatures even when implements shake violently.</p>



<p><strong>BIAS REPEATABILITY.</strong>&nbsp;This is the lifetime bias drift expectation that intends to capture all unmodeled error sources and is not commonly specified in MEMS IMU datasheets. It provides a single error window that will determine the convergence times for critical estimation/filter loops. For systems that need to turn and deploy quickly, failure to anticipate and quantify these errors can limit deployment time and degrade initial heading accuracy. In their latest products, ADI has expanded their Bias Repeatability definition to include turn-on drift/settling, drift from package stress relief, electronic drift and thermal hysteresis. In parallel with expanding the coverage of this specification, ADI has reduced this metric by an order of magnitude in recently-released devices, such as the ADIS16545 and ADIS16576.&nbsp;</p>



<p><strong>AXIS-TO-AXIS ALIGNMENT.</strong>&nbsp;With tight axis-to-axis alignment out of the box and calibrated through an extensive inertial routine over multiple temperature set-points, tight alignment can be achieved only using mechanical alignment features. For tighter alignment than 0.25° one could leverage the tight axis-to-axis alignment (along with excellent bias repeatability in the accelerometer) to greatly simplify the frame alignment process.&nbsp;</p>



<p><strong>LINEAR, TEMPERATURE-CONTROLLED BEHAVIOR.</strong>&nbsp;Temperature gradients on tractors and implements are large. ADI incorporates temperature compensation models enforced at both the sensor and system level. The goal is not perfect thermal invariance, which is unrealistic in cost-sensitive segments, but predictable behavior that fusion algorithms can model accurately.</p>



<p><strong>FUSION-FIRST PHILOSOPHY.</strong>&nbsp;ADI treats the IMU as one component of a larger PNT solution. Their systems are designed for tight integration with GNSS receivers, wheel speed sensors, magnetometers, and vehicle CAN data. Robust synchronization and time-based alignment of the inertial output simplifies system coupling. This architecture enables robust attitude estimation and velocity smoothing, especially during headlands or canopy exposure.</p>



<p><strong>PREDICTABLE LIFECYCLE PERFORMANCE.&nbsp;</strong>Agricultural platforms must last. ADI designs for multi-season reliability and bounded long-term drift. The objective is to ensure a machine equipped with an ADI IMU behaves the same in year four as it did in year one.</p>



<p>“You can’t calibrate a sensor’s inherent noise performance, its stability, or its response to vibration,” Galchev said. “These unmodeled error sources directly produce error at the output, and that’s where ADI focuses on innovating at the chip level.”</p>



<p>This technical discipline supports the system-level view: Inertial is not a premium feature; it is a foundation for reliable GNSS-enabled autonomy.</p>



<h3 class="wp-block-heading" id="h-integration-in-the-field-what-engineers-face">Integration in the Field: What Engineers Face</h3>



<p>Engineers integrating inertial systems into agricultural machines confront real-world constraints that differ from lab conditions. ADI’s field experience highlights specific patterns.</p>



<p>Booms flex. Toolbars vibrate. Tractor frames twist. Sensor placement often becomes a compromise. An INS may be exposed to off-axis motion uncorrelated with actual vehicle trajectory. ADI mitigates this through calibration routines, filtering strategies, and noise modeling that treat flex and vibration as signal partitions.</p>



<h3 class="wp-block-heading" id="h-implements-as-independent-dynamic-systems">Implements as Independent Dynamic Systems</h3>



<p>The implement behind a tractor behaves differently from the tractor itself. For operations like variable-rate spraying or multi-row harvesting, implement attitude, even when decoupled from tractor motion, must be sensed accurately. IMUs can be mounted on booms or frames to track these dynamics.</p>



<p>Agricultural systems rely on multiple data streams: GNSS, wheel speed, steering angle, hydraulic cylinder positions, and sometimes LiDAR or camera inputs. INS integration requires precise timing alignment. ADI designs its systems for deterministic latency and reliable time stamping, which improves fusion accuracy.</p>



<p>The transition from row guidance to headland turns stresses both GNSS and INS. Machines accelerate, decelerate, rotate sharply, and pass through GNSS-obstructed corners. ADI’s inertial fusion helps maintain attitude and velocity states during these high-dynamic transitions.</p>



<p>Agricultural drones operate close to trees and terrain. Ground robots operate beneath canopy. INS solutions provide roll/pitch stability, altitude smoothing, and fallback motion propagation when GNSS is degraded.</p>



<h3 class="wp-block-heading" id="h-economics-performance-within-reach">Economics: Performance Within Reach</h3>



<p>Precision agriculture is expanding beyond large, capital-intensive farms. The next wave of adoption will come from mid-market operations and mixed-crop geographies.</p>



<p>• Cost matters. Expensive IMUs are non-starters. ADI designs MEMS-based solutions that offer robust performance within an accessible cost envelope.</p>



<p>• Scalability drives OEM decisions. Manufacturers want sensors available in volume, with predictable lead times and long lifecycle commitments.</p>



<p>• Global adoption requires price/performance balancing. Emerging markets need PNT reliability but cannot bear aerospace-grade costs. Scalable, rugged MEMS solutions fill this gap.</p>



<p>• Autonomy ROI depends on continuity. If a machine can maintain guidance through GNSS disruptions, it can operate longer hours and at higher speeds, improving economics for both OEMs and end-users.</p>



<p>“Just because you go from a big tractor to a smaller tractor, the conditions don’t change that much,” Galchev said. “If you want to achieve the same mission profile, you still need the same performance level.”</p>



<p>As ADI brings cost-efficient inertial capability into mainstream ag equipment, the performance gap between high-end and mid-tier platforms narrows.</p>



<h3 class="wp-block-heading" id="h-the-road-ahead-multi-sensor-fusion-and-autonomy">The Road Ahead: Multi-Sensor Fusion and Autonomy</h3>



<p>Agriculture is evolving toward heterogeneous fleets: autonomous tractors, robotic harvesters, terrain-following sprayers, orchard drones, and edge-connected implements. All require resilient PNT.</p>



<p><strong>End-of-row autonomy</strong></p>



<p>Low-speed, high-precision maneuvers demand stable attitude estimation. INS ensures smooth transitions even in partial GNSS shadows.</p>



<p><strong>Terrain-following and boom dynamics</strong></p>



<p>Sprayers rely on roll/pitch estimates for boom control. IMU data supports rapid damping of boom oscillation, improving chemical placement, reducing drift, and lowering input costs.</p>



<p><strong>Cooperative ground-air systems</strong></p>



<p>Drones performing scouting missions must integrate with guidance systems on the ground. Consistent inertial performance across platforms enables better data fusion and farm-level coordination.</p>



<p><strong>Resilience as a design requirement</strong></p>



<p>Interference, accidental or intentional, is increasingly common. INS helps maintain continuity of operation when GNSS performance degrades. It stabilizes machine behavior during uncertainty and helps diagnostic systems detect anomalies.</p>



<p><strong>Regulatory evolution</strong></p>



<p>As autonomy expands, functional-safety requirements will increase. INS adds a measurable layer of redundancy and validation, supporting safety cases for next-generation machines.</p>



<p>“We have sensors that we released more than 20 years ago still being produced,” Galchev said, “because our customers’ systems have long lifespans and once something works, it can be very difficult and expensive to re-qualify and swap it out.”</p>



<p>As autonomy accelerates, the next decade of agriculture will be shaped by platforms that assume GNSS variability and engineer around it from day one. That shift elevates inertial from an add-on to a core requirement. ADI, with its long record of sensor innovation and system-level discipline, is positioned to anchor that transition. Their approach: predictable drift behavior, calibration at the silicon level, ruggedized packaging, and tight GNSS-INS fusion, gives OEMs a stable foundation to build autonomy across tractors, implements, drones, and emerging agricultural robots. The path forward is clear: Resilient PNT will define productivity, and ADI’s inertial technology will increasingly sit at the center of the autonomy stack, enabling machines that navigate, adapt and operate with confidence in the real conditions of the farm.</p>
<p>The post <a href="https://insidegnss.com/from-field-to-furrow/">Precision Ag: From Field to Furrow</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Leveraging Advanced ML to Detect and Mitigate Spoofing and Jamming</title>
		<link>https://insidegnss.com/leveraging-advanced-ml-to-detect-and-mitigate-spoofing-and-jamming/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 21:48:45 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196324</guid>

					<description><![CDATA[<p>Authors develop and demonstrate a receiver agnostic, real-time signal cleaner that uses innovative, efficient algorithms as well as machine learning methods. WAHYUDIN P....</p>
<p>The post <a href="https://insidegnss.com/leveraging-advanced-ml-to-detect-and-mitigate-spoofing-and-jamming/">Leveraging Advanced ML to Detect and Mitigate Spoofing and Jamming</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Authors develop and demonstrate a receiver agnostic, real-time signal cleaner that uses innovative, efficient algorithms as well as machine learning methods.</em></p>



<span id="more-196324"></span>



<p>WAHYUDIN P. SYAM,* NABEEL ALI KHAN,* MICHAEL TURNER, LUIS ENRIQUE AGUADO,&nbsp;<br>BEN WALES, LISA GUERRIERO, BARIS TOZ, INCHARA LAKSHMINARAYAN, TOM STACEY,&nbsp;<br>MARIA IVANOVICI, TERRI RICHARDSON, <strong>GMV</strong></p>



<p>GNSS has provided global positioning, navigation and time (PNT) solutions for many application domains covering safety critical, liability critical and commercial applications. However, because of the relatively low-power signal around -128&nbsp;dBm and the openness of the signal structures, GNSS signals are vulnerable to jamming and spoofing attacks [1,2]. These attacks significantly disrupt GNSS services, making them unavailable or producing invalid PNT solutions that might cause severe impacts on assets or people using the services. There are various well-known interference and jamming attacks including broadband (such as CDMA) jamming, frequency-hopping jamming, narrow-band jammer, and frequency-sweep or chirp (and pulsed chirp) jamming attacks as well as spoofing attacks ranging from a brute force spoofer transmitting GNSS-like signals at higher power, to meaconing (replay), to aligned or overlapping and sophisticated spoofing attacks [3]. Interference could be non-intentional, such as frequency interference from communication signals, or intentional, such as chirp jamming. Spoofing attacks are most likely intentional. With the growing capability and affordability of software-defined radio (SDR) and advanced spoofing generation algorithms, spoofing attacks have become more significant. Because of this, there is a need to develop a receiver-agnostic and flexible signal cleaner system to increase the resilience of GNSS services in vulnerable environments threatened by GNSS interference and spoofing.</p>



<p>This article aims to develop and demonstrate a receiver-agnostic, real-time signal cleaner system that uses innovative and efficient algorithms for detecting, characterizing and mitigating jamming and spoofing signals. For spoofing, the mitigation focuses on overlapping (aligned) spoofing attacks on the GPS L1 C/A signal.&nbsp;<strong>Figure 1</strong>&nbsp;shows the schematic view of the signal cleaner system. In this system, the developed jamming and spoofing detection and mitigation algorithms use optimized signal processing techniques and advanced machine learning algorithms. The system is configurable and uses commercial-off-the-shelf (COTS) components including a GNSS antenna, a high-performance computer for real-time jamming and spoofing detection and mitigation processing, a radio-frequency front-end to receive and transmit GNSS signals, and a downstream commercial receiver to receive and process the mitigated/cleaned signal from the system. The system can operate in real-time up to a 20MHz sampling rate and is designed for flexibility, allowing for seamless integration between a GNSS antenna and a receiver without modifications to the receiver&#8217;s existing infrastructure.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="646" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM.png" alt="Screenshot 2026-02-11 at 5.31.20 PM" class="wp-image-196337" style="aspect-ratio:1.8111987062866384;width:590px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-300x166.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-1024x565.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-768x424.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.20-PM-48x27.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="534" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM.png" alt="Screenshot 2026-02-11 at 5.31.29 PM" class="wp-image-196338" style="aspect-ratio:2.187321995280332;width:591px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-300x137.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-1024x468.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-768x351.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-36x16.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.29-PM-48x22.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-jamming-detection-and-mitigation-nbsp">Jamming Detection and Mitigation&nbsp;</h3>



<p>The overall jamming detection and mitigation system is composed of two modules a) an interference detection module and b) an interference mitigation module&nbsp;<strong>(Figure 2)</strong>.&nbsp;</p>



<h3 class="wp-block-heading" id="h-jamming-detection-and-characterization">Jamming Detection and Characterization</h3>



<p>The interference detection and characterization system extract a) periodicity detection feature and b) frequency modulation features from a segment of received signal to detect and characterize interference <strong>(Figure 3)</strong>.&nbsp;</p>



<p><strong>Periodicity Detection Feature:</strong>&nbsp;The periodicity check is performed to analyze whether the interfering signal is periodic (x[n]=x[n+K]) or aperiodic. A chirping signal can become a periodic signal if the same sequence is repeated over time. However, this is not always the case. In periodic interference, the interfering signal becomes sparse in the frequency domain and appears as a train of impulses&nbsp;<strong>(Figure 4)</strong>.&nbsp;</p>



<p>To find out whether the interfering signal is periodic or non-periodic, we first transform a given signal of N<sub>F</sub>&nbsp;samples in the frequency domain as X[k]=∑<sub>n</sub>x[n]e<img decoding="async" src="blob:https://insidegnss.com/34ac2b00-be20-4f3d-98a0-9a997ebdf625" alt="">. The parameter N<sub>F</sub>&nbsp;is based on the periodicity interval, i.e., K of the interference signal. It should be at least 8 times the periodicity interval of the interference signal, N<sub>F</sub>&gt;8K. We detect a&nbsp;<em>M</em>&nbsp;number of strong peaks from the |X[k]|<sup>2</sup>&nbsp;and store them in Y[k]. The periodicity detection feature is defined as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="46" src="https://insidegnss.com/wp-content/uploads/2026/02/2.png" alt="2" class="wp-image-196326" srcset="https://insidegnss.com/wp-content/uploads/2026/02/2.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/2-300x43.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/2-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/2-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/2-48x7.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>In case of periodic interference, F<sub>1</sub>&nbsp;has a higher value whereas for non-periodic interference or noise, F<sub>1</sub>&nbsp;has a lower value.&nbsp;</p>



<p><strong>Frequency Modulation Feature:&nbsp;</strong>Frequency modulated jammers are modeled as J(t)=Ae<sup>(j∫f(τ)dτ)</sup>, where A is the signal amplitude and f(t) is the instantaneous frequency (IF). To extract the frequency modulation feature, we first employ the adaptive notch filter (ANF) to track the IF curve. The IF information is then used to de-chirp J(t) and the frequency modulation detection feature is extracted based on its covariance matrix.&nbsp;</p>



<p>The steps to estimate the frequency modulation feature are:</p>



<p><strong>IF estimation:</strong>&nbsp;The IF is defined as derivative of the phase of the incoming signal, implying it can be simply estimated as:&nbsp;<em>f</em><sub>0</sub>[n]=∠x[n]x<sup>*</sup>[n-1]. The ANF based IF estimation method adopts a recursive approach where a past estimate of the IF is used as a predicted value and phase difference between the current sample of signal and past sample of its bandpass filtered version are employed to correct the predicted IF [4]:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="20" src="https://insidegnss.com/wp-content/uploads/2026/02/3.png" alt="3" class="wp-image-196327" srcset="https://insidegnss.com/wp-content/uploads/2026/02/3.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/3-300x19.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/3-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/3-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/3-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where u is update rate, x<sub>r</sub>&nbsp;[n] is bandpass filtered signal obtained by placing pole close to&nbsp;<em>f</em><sub>0</sub>[n] that suppresses out of the band noise:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="21" src="https://insidegnss.com/wp-content/uploads/2026/02/4.png" alt="4" class="wp-image-196328" srcset="https://insidegnss.com/wp-content/uploads/2026/02/4.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/4-300x20.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/4-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/4-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/4-48x3.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where k<sub>α</sub>&nbsp;is filter bandwidth of the control parameter.</p>



<p>Once crude IF is estimated, the refined estimate is obtained by using&nbsp;<em>f</em><sub>0</sub>[n] as the predicted value and performing correction based on the moving average of the phase differences of x[n] and x<sub>r</sub>&nbsp;[n-1] as discussed in [4]:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="38" src="https://insidegnss.com/wp-content/uploads/2026/02/5.png" alt="5" class="wp-image-196329" srcset="https://insidegnss.com/wp-content/uploads/2026/02/5.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/5-300x36.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/5-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/5-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/5-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p><strong>Feature Extraction:</strong>&nbsp;Once the IF is estimated, the corresponding instantaneous phase is estimated as:&nbsp;<img decoding="async" src="blob:https://insidegnss.com/444dc067-293c-4c35-b7db-38de1db85bc5" alt="">. The estimated instantaneous phase is used to de-chirp the signal as&nbsp;<em>x</em><em><sub>c</sub></em>[<em>n</em>]=<em>x</em>[<em>n</em>] e<sup>-j[</sup><em><sup>n</sup></em><sup>]</sup>. This de-chirped signal now has high temporal correlation&nbsp;<strong>(Figure 5)</strong>.&nbsp;</p>



<p>The covariance matrix of <em>x<sub>c</sub></em>[<em>n</em>] is computed as:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="394" height="64" src="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM.png" alt="Screen Shot 2026-02-27 at 2.56.05 PM" class="wp-image-196386" style="aspect-ratio:6.157753357753358;width:259px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM.png 394w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM-300x49.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-2.56.05-PM-48x8.png 48w" sizes="auto, (max-width: 394px) 100vw, 394px" /></figure>



<p>In case of a frequency modulated jamming signal, all the elements of <em>R</em>[<em>n,m</em>] will have values significantly greater than zero whereas for GNSS signals, non-diagonal elements would be close to zero. So, the ratio of the sum of diagonal elements of <em>R</em>[<em>n,m</em>] versus the sum of all the elements can be used as a test statistic [4] of F<sub>2</sub> and will have a higher value for pure GNSS signal and a lower value for GNSS signals corrupted by noise, as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="37" src="https://insidegnss.com/wp-content/uploads/2026/02/9.png" alt="9" class="wp-image-196330" srcset="https://insidegnss.com/wp-content/uploads/2026/02/9.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/9-300x35.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/9-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/9-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/9-48x6.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p id="h-decision-tree-based-classification-we-trained-a-machine-learning-classifier-to-solve-a-multi-class-classification-problem-detecting-periodic-and-frequency-modulated-interferences-the-training-dataset-is-generated-by-adding-interferences-to-recorded-gnss-signals-of-100ms-duration-and-15mhz-bandwidth-the-following-type-interferences-are-used-to-train-the-classifier-which-are-chirp-type-non-stationary-interference-and-periodic-interference-the-decision-tree-is-trained-using-the-frequency-modulation-feature-and-periodicity-feature-for-the-following-classes-1-periodic-interference-2-frequency-modulated-interference-and-3-interference-free-gnss-signal-the-decision-tree-is-presented-in-figure-6-jamming-mitigation"><strong>Decision Tree based Classification:</strong>&nbsp;We trained a machine learning classifier to solve a multi-class classification problem: detecting periodic and frequency modulated interferences. The training dataset is generated by adding interferences to recorded GNSS signals of 100ms duration and 15MHz bandwidth. The following type interferences are used to train the classifier, which are chirp type non-stationary interference and periodic interference. The decision tree is trained using the frequency modulation feature and periodicity feature for the following classes: (1) Periodic interference, (2) Frequency modulated interference and (3) Interference free GNSS signal. The decision tree is presented in&nbsp;<strong>Figure 6.&nbsp;</strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="478" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM.png" alt="Screenshot 2026-02-11 at 5.31.40 PM" class="wp-image-196339" style="aspect-ratio:2.4435252943048043;width:591px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-300x123.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-1024x419.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-768x314.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.40-PM-48x20.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="636" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM.png" alt="Screenshot 2026-02-11 at 5.31.48 PM" class="wp-image-196340" style="aspect-ratio:1.8396468535058002;width:598px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-300x163.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-1024x557.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-768x417.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.48-PM-48x26.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="654" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM.png" alt="Screenshot 2026-02-11 at 5.31.57 PM" class="wp-image-196341" style="aspect-ratio:1.7829071734155806;width:601px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-300x168.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-1024x574.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-768x431.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.31.57-PM-48x27.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1162" height="608" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM.png" alt="Screenshot 2026-02-11 at 5.32.07 PM" class="wp-image-196342" style="aspect-ratio:1.9111948522876747;width:600px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM.png 1162w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-300x157.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-1024x536.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-768x402.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-36x19.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.07-PM-48x25.png 48w" sizes="auto, (max-width: 1162px) 100vw, 1162px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full"><img loading="lazy" decoding="async" width="1778" height="172" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM.png" alt="Screenshot 2026-02-11 at 5.32.22 PM" class="wp-image-196343" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM.png 1778w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-300x29.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-1024x99.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-768x74.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-1536x149.png 1536w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.22-PM-48x5.png 48w" sizes="auto, (max-width: 1778px) 100vw, 1778px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-jamming-mitigation">Jamming Mitigation</h3>



<p id="h-jamming-mitigationthe-interference-mitigation-unit-employs-the-outputs-of-the-detection-module-to-select-the-type-of-mitigation-to-be-performed-if-the-interference-is-frequency-modulated-then-the-if-based-interference-mitigation-is-employed-however-if-the-interference-is-classified-as-periodic-interference-e-g-narrow-band-or-cdma-type-then-the-robust-transform-domain-filtering-is-employed-if-a-signal-is-periodic-in-the-time-domain-e-g-cdma-signal-with-period-t-then-its-frequency-domain-representation-becomes-sparse-with-frequency-components-appearing-only-at-integer-multiples-of-1-t-figure-7-such-interference-can-be-easily-removed-by-applying-non-linearity-in-the-frequency-domain">The interference mitigation unit employs the outputs of the detection module to select the type of mitigation to be performed. If the interference is frequency modulated, then the IF-based interference mitigation is employed. However, if the interference is classified as periodic interference, e.g., narrow band or CDMA type, then the robust transform domain filtering is employed. If a signal is periodic in the time-domain, e.g., CDMA signal, with period T, then its frequency domain representation becomes sparse with frequency components appearing only at integer multiples of 1/T,&nbsp;<strong>(Figure 7)</strong>. Such interference can be easily removed by applying non-linearity in the frequency domain.</p>



<p>The periodic interference mitigation methods are mentioned in the following steps:&nbsp;</p>



<p>1. Transform a signal into frequency domain as</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="300" height="66" src="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.00.48-PM.png" alt="Screen Shot 2026-02-27 at 3.00.48 PM" class="wp-image-196387" style="aspect-ratio:4.546448087431694;width:136px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.00.48-PM.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.00.48-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.00.48-PM-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.00.48-PM-48x11.png 48w" sizes="auto, (max-width: 300px) 100vw, 300px" /></figure>



<p>where NF is the number of samples in the signal. To effectively mitigate the interfering signal, NF needs to have a higher value as it provides higher frequency resolution to identify bins corresponding to interfering signal. </p>



<p>2. Apply Huber’s non-linearity:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="31" src="https://insidegnss.com/wp-content/uploads/2026/02/11.png" alt="11" class="wp-image-196331" srcset="https://insidegnss.com/wp-content/uploads/2026/02/11.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/11-300x29.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/11-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/11-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/11-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>3. Inverse transform the signal into time domain as:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="35" src="https://insidegnss.com/wp-content/uploads/2026/02/12.png" alt="12" class="wp-image-196332" srcset="https://insidegnss.com/wp-content/uploads/2026/02/12.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/12-300x33.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/12-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/12-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/12-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p><em>T</em><em><sub>h</sub></em>&nbsp;is a data dependent threshold that is selected so most of the signal energy is passed undistorted and only bins corresponding to the interference are saturated. We know most of the desired signal energy is less than μ+2σ where μ is the mean of |X[k]| and σ is its standard deviation. The strong interference appears as spikes in frequency domain that may bias the estimate of μ and σ, so we use the median in place of mean and median absolute deviation in place of σ. So, the threshold is computed as: T=median (|X[k]|)+2 median (||X[k]|–median (|X[k]|)|).</p>



<p>Frequency modulated interference mitigation is as follows. If frequency modulated interference is detected, then zero-phase notched filter is applied as in [4]:&nbsp;</p>



<p>• The signal is de-chirped as:</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="404" height="70" src="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM.png" alt="Screen Shot 2026-02-27 at 3.02.58 PM" class="wp-image-196388" style="aspect-ratio:5.772679874869656;width:150px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM.png 404w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM-300x52.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.02.58-PM-48x8.png 48w" sizes="auto, (max-width: 404px) 100vw, 404px" /></figure>



<p>• The notch filter is applied as:&nbsp;<em>g</em>[<em>n</em>]=βg[<em>n</em>-1]+<em>x</em><em><sub>c</sub></em>[<em>n</em>]-<em>x</em><em><sub>c</sub></em>[<em>n</em>-1]</p>



<p>• The output of the notched filter is flipped:&nbsp;<em></em>[<em>n</em>]=<em>g</em>[-<em>n</em>]</p>



<p>• The notch filter is applied again:<br><img decoding="async" src="blob:https://insidegnss.com/9d49db5f-fad6-4e5c-867e-4e56566c09a3" alt="">[<em>n</em>]=k<sub>α</sub><img decoding="async" src="blob:https://insidegnss.com/9d49db5f-fad6-4e5c-867e-4e56566c09a3" alt="">[<em>n</em>-1]+<em></em>[<em>n</em>]-<em></em>[<em>n</em>-1].</p>



<p>• The output is flipped&nbsp;<em>y</em><em><sub>c</sub></em>[<em>n</em>]=<img decoding="async" src="blob:https://insidegnss.com/9d49db5f-fad6-4e5c-867e-4e56566c09a3" alt="">[-<em>n</em>]</p>



<p>• The filtered signal is then chirped again: </p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="388" height="82" src="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM.png" alt="Screen Shot 2026-02-27 at 3.04.56 PM" class="wp-image-196389" style="aspect-ratio:4.732949876746097;width:147px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM.png 388w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM-300x63.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screen-Shot-2026-02-27-at-3.04.56-PM-48x10.png 48w" sizes="auto, (max-width: 388px) 100vw, 388px" /></figure>



<p>Note that unlike the conventional ANF that performs mitigation online on a sample-by-sample basis, this method processes stored buffer of sample in both directions. This forward and backward filtering overcomes the non-linear phase distortions common in the conventional ANF.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="788" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM.png" alt="Screenshot 2026-02-11 at 5.32.30 PM" class="wp-image-196344" style="aspect-ratio:1.482257575339822;width:532px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-300x202.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-1024x691.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-768x518.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-36x24.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.30-PM-48x32.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="258" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1.png" alt="Screenshot 2026-02-11 at 5.32.38 PM" class="wp-image-196346" style="width:657px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-300x66.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-1024x226.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-768x170.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.38-PM-1-48x11.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="760" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM.png" alt="Screenshot 2026-02-11 at 5.32.44 PM" class="wp-image-196347" style="aspect-ratio:1.536878216123499;width:595px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-300x195.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-1024x666.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-768x500.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.44-PM-48x31.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="620" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM.png" alt="Screenshot 2026-02-11 at 5.32.52 PM" class="wp-image-196348" style="aspect-ratio:1.8839360807401178;width:622px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-300x159.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-1024x544.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-768x408.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-36x19.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.52-PM-48x25.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="682" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM.png" alt="Screenshot 2026-02-11 at 5.32.59 PM" class="wp-image-196349" style="aspect-ratio:1.7155439257108211;width:594px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-300x175.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-1024x597.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-768x448.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.32.59-PM-48x28.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-spoofing-detection-and-mitigation-nbsp">Spoofing Detection and Mitigation&nbsp;</h3>



<p><strong>Spoofing Detection</strong></p>



<p>The method of spoofing detection and mitigation focuses on overlapping or aligned spoofing attacks where spoofers code delay is within ±1chip with an authentic signal. This aligned spoofing will significantly degrade the correlator shape of authentic signals and its local pseudorange (PRN) code [6].&nbsp;<strong>Figure 8</strong>&nbsp;shows examples of the correlator shape of an authentic and spoofed GPS L1 C/A signal. When there are no spoofers, the correlator shape is a triangle (at epoch 40s). However, the correlator shape is significantly distorted when an aligned spoofer presents (at epoch 165s). The total correlator taps for spoofing detection and mitigation is selected to be 15-tap considering the correlation resolution for spoofer estimation as well as computational load to satisfy real-time processing. The 15-tap correlators consist of seven taps for both late and early chips, and one tap for the prompt chip. Ideally, correlator tap resolution should be as high as possible to accurately estimate spoofer code delay for spoofing detection and mitigation.&nbsp;<strong>Table 1</strong> shows the 15-tap selected to calculate correlation between the GPS signal and its local PRN code.</p>



<p>Spoofing detection is performed using a deep neural network (DNN) model [7] that was selected following a trade-off analysis among support vector machines (SVM) and convolutional neural networks (CNNs). The number of parameters of the three evaluated models are 53, 8,418 and 211,437 for SVM, DNN and CNN, respectively. The SVM model has the smallest model size that cause limitations on spoofing detection accuracy [8]. Meanwhile, the CNN, although capable of automatic feature extraction, has a large number of parameters, making training difficult [7]. The DNN model architecture, shown in&nbsp;<strong>Figure 9,</strong>&nbsp;is a fully connected feed forward neural network with three-hidden layers with tanh activation functions. The selection of this architecture is to trade-off between detection accuracy and detection speed. These models have been trained and tested with the TEXBAT spoofing dataset [9].&nbsp;<strong>Table 2</strong><br>presents the details of the dataset for training and testing the three ML models. Ten signals cover the clean and spoofed GPS L1 C/A signal.</p>



<p>The inputs to the ML models are 50 calculated features extracted from the correlator outputs of both GNSS signals. These features include the ratio of partial data bits [10], slope-based ratios [11], simple ratios, sum ratios, difference ratios [12], residuals of correlation functions [6] and the skewness of correlator points.&nbsp;<strong>Table 3</strong>&nbsp;details the description of the calculated features as inputs for the ML models.<strong>Figure 10</strong>&nbsp;gives examples of the sensitivity of the features calculated on authentic signals and spoofed signals on the selected TEXBAT signal dataset. The calculated features can capture the degradation of correlator shapes calculated when overlapping or aligned spoofers exist&nbsp;<strong>(Figure 10)</strong>.</p>



<p>Spoofing detection is classified into 2-class and 3-class detection.&nbsp;<strong>Figure 11</strong>&nbsp;shows the 3-class classification where a correlator output is detected as clean (class 1), overlapping at prompt tap (class 2), and overlapping at non-prompt tap (class 3). Meanwhile, 2-class classification only differentiates between clean (class 1) and spoofed situation (class 2+ class 3). Results of spoofing detection&nbsp;<strong>(Table 4)</strong>&nbsp;show that 3-class classification has lower detection accuracy than 2-class classification. The DNN model performance, with 3-class training and test accuracy of 99.4% and 98.8% respectively, is the best compared to the SVM and CNN model performance. The CNN, especially for 3-class classification, has the worst performance of training and testing accuracy of only 67.4% and 67.7%, respectively. That may be caused by insufficient data to train CNN large model capacity. Note the data for overlapping at prompt tap is much smaller compared to the other class, clean and overlapping at non-prompt tap.</p>



<p>A total of 200s durations of the clean signal in the TEXBAT data set is used to assess the false alarm rate because the spoofing detection is performed per tracking epoch with 1ms coherent integration time. There is a total of 200,000 data points for the false alarm assessment. The spoofing alarm is raised when there are 30 consecutive spoofing detections. When there is a 10ms duration of spoofing detection, a spoofing alarm rises. The false alarm rate is 0.009 for an open-sky signal with no or minimal multipath effect. For a signal with heavy multipath impairments, such as in dense urban areas, the false alarm rate degraded to 0.015. That’s because the overlapping spoofing phenomenon is like multipath phenomenon in terms of degradations of correlator output shapes.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="648" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM.png" alt="Screenshot 2026-02-11 at 5.33.04 PM" class="wp-image-196350" style="aspect-ratio:1.7994376757263355;width:545px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-300x167.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-1024x569.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-768x427.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.04-PM-48x27.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="406" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM.png" alt="Screenshot 2026-02-11 at 5.33.10 PM" class="wp-image-196351" style="aspect-ratio:2.8719482878358886;width:615px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-300x104.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-1024x357.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-768x267.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.10-PM-48x17.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="398" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM.png" alt="Screenshot 2026-02-11 at 5.33.18 PM" class="wp-image-196352" style="aspect-ratio:2.929700272479564;width:647px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-300x102.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-1024x350.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-768x262.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.18-PM-48x16.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="740" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM.png" alt="Screenshot 2026-02-11 at 5.33.26 PM" class="wp-image-196353" style="aspect-ratio:1.5810834656784896;width:583px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-300x190.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-1024x648.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-768x486.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.26-PM-48x30.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>


<p id="h-spoofing-mitigation"><strong>Spoofing Mitigation</strong></p>



<p>The spoofing mitigation method focuses on recovering an authentic GPS L1 C/A signal from an aligned match-power spoofing attack instead of canceling the signal. The spoofing mitigation algorithm uses an impulse method to calculate the second gradient of correlator outputs of GNSS signals to estimate the code delay of authentic and spoofer signals based on the two largest gradient impulses. The final estimated second-gradient impulse is calculated as a weighted average of three neighbor impulses. In addition, using these impulses, the spoofer’s power and phase are estimated. Subsequently, a negative replica of the spoofer signal is generated and subtracted from the original signal (containing both the spoofer and authentic signals). This subtraction process effectively removes the spoofer signal, isolating the authentic signal component.</p>



<p>The impulse is the second gradient of correlator outputs. The first G<sup>1</sup>&nbsp;and second gradient G<sup>2</sup>&nbsp;(the impulse) are calculated as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="36" src="https://insidegnss.com/wp-content/uploads/2026/02/21.png" alt="21" class="wp-image-196333" srcset="https://insidegnss.com/wp-content/uploads/2026/02/21.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/21-300x34.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/21-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/21-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/21-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where Δcorr is the difference between two consecutives correlator outputs and Δchip is the difference between the two consecutive chips. ΔG<sup>1</sup>&nbsp;is the difference between two consecutives first gradient G<sup>1</sup>&nbsp;outputs and Δ<em>chip</em><sup>1</sup>&nbsp;is the difference between the two consecutive chips after the G<sup>1</sup>&nbsp;calculation.</p>



<p>The accuracy of spoofer parameter estimation, especially the spoofer code delay, highly depends on the chip tap resolutions. Small chip tap distance will have high accuracy estimation. However, the smaller the chip tap distance (high accuracy detection), the higher the sampling frequency required. There is a trade-off between high accuracy spoofer parameter estimations and computational requirements to process the sampled signal. Because the numbers of 15-tap correlators are considered sparse, we need to improve and smooth the code-delay estimation by using a weighted-average method. The final estimated code delay (tap location) is:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="56" src="https://insidegnss.com/wp-content/uploads/2026/02/22.png" alt="22" class="wp-image-196334" srcset="https://insidegnss.com/wp-content/uploads/2026/02/22.png 319w, https://insidegnss.com/wp-content/uploads/2026/02/22-300x53.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/22-24x4.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/22-36x6.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/22-48x8.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<p>Where&nbsp;<em>I</em><em><sub>i</sub></em>&nbsp;is the 2<sup>nd</sup>&nbsp;gradient impulse at the&nbsp;<em>i</em>-th tap index and&nbsp;<em>Tap</em><em><sub>i</sub></em>&nbsp;is the&nbsp;<em>i</em>-th tap index. In short, the refined estimate of the code delay or tap location is based on the neighbor’s 2<sup>nd</sup>&nbsp;gradient impulse at the tap location to be refined. The spoofer is identified as the largest impulse from the two largest gradient impulses.</p>



<p>From these two decomposed signals, we estimate the spoofer’s power and the IQ carrier phase rotation. The power and IQ rotation θ estimation are as follows:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="319" height="31" src="https://insidegnss.com/wp-content/uploads/2026/02/23.png" alt="23" class="wp-image-196335" srcset="https://insidegnss.com/wp-content/uploads/2026/02/23.png 319w, https://insidegnss.com/wp-content/uploads/2026/02/23-300x29.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/23-24x2.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/23-36x3.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/23-48x5.png 48w" sizes="auto, (max-width: 319px) 100vw, 319px" /></figure>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="318" height="34" src="https://insidegnss.com/wp-content/uploads/2026/02/24.png" alt="24" class="wp-image-196336" srcset="https://insidegnss.com/wp-content/uploads/2026/02/24.png 318w, https://insidegnss.com/wp-content/uploads/2026/02/24-300x32.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/24-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/24-36x4.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/24-48x5.png 48w" sizes="auto, (max-width: 318px) 100vw, 318px" /></figure>



<p>Where&nbsp;<em>I</em><em><sub>p</sub></em>&nbsp;and&nbsp;<em>Q</em><em><sub>p</sub></em>&nbsp;are the&nbsp;<em>I</em>&nbsp;and&nbsp;<em>Q</em>&nbsp;correlator output at the&nbsp;<em>p</em>-th tap location (code delay) estimated by the weighted-average of the 2<sup>nd</sup>&nbsp;gradient impulse.&nbsp;<em>Power</em><em><sub>adjustment</sub></em>&nbsp;is the adjusted power for each decomposed signal that is the ratio of its 2<sup>nd</sup>&nbsp;gradient impulse over the total summation of the two highest 2<sup>nd</sup>&nbsp;gradient impulse (<em>impulse</em><em><sub>i</sub></em>,&nbsp;<em>impulse</em><em><sub>j</sub></em>).</p>



<p><strong>Figure 12</strong>&nbsp;presents the impulse from 15-tap correlator outputs calculated from a nominal GPS L1 signal. In nominal conditions, the highest impulse (2<sup>nd</sup>&nbsp;gradient) will be at the prompt tap. Simulations of impulse calculation from spoofed GPS signals at various spoofer delays and 60° carrier phase difference between the authentic and spoofer components are shown in&nbsp;<strong>Figure 13.</strong>&nbsp;The spoofer power is set to be 1.5 × the authentic signal’s power.</p>



<p><strong>Figure 14</strong>&nbsp;shows a simulated GPS L1 C/A spoofed signal, containing authentic and spoofer components, and the implementation of the spoofer mitigation (cleaner) processes where the spoofer component (red) is removed leaving only the authentic signal component (green). The effectiveness of the mitigation depends on how distorted the signal correlator is. To evaluate the mitigation performance, the mitigation method is applied to different tracking epoch (1ms) to TEXBAT dataset signals at different C/N<sub>0</sub>. The C/N<sub>0</sub>&nbsp;is used as the signal quality measure.&nbsp;</p>



<p><strong>Figure 15</strong>&nbsp;illustrates spoofing mitigation performance under different signal C/N<sub>0</sub>. From performance test results, the spoofing mitigation can faithfully remove spoofer components and restore authentic components when the C/N<sub>0</sub>&nbsp;is &gt; 40dB-Hz. When the signal has C/N<sub>0</sub>&nbsp;of &lt; 40dB-Hz, the correlator shape distortion is too large, so we cannot faithfully estimate the spoofer parameters and remove the spoofer components.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="744" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM.png" alt="Screenshot 2026-02-11 at 5.33.34 PM" class="wp-image-196354" style="aspect-ratio:1.5726195699868364;width:594px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-300x191.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-1024x651.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-768x488.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.34-PM-48x31.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="624" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM.png" alt="Screenshot 2026-02-11 at 5.33.42 PM" class="wp-image-196355" style="width:589px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-300x160.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-1024x546.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-768x410.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-36x19.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.42-PM-48x26.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="560" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM.png" alt="Screenshot 2026-02-11 at 5.33.51 PM" class="wp-image-196356" style="aspect-ratio:2.0893086160662238;width:598px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-300x144.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-1024x490.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-768x368.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-36x17.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.33.51-PM-48x23.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1170" height="760" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM.png" alt="Screenshot 2026-02-11 at 5.34.01 PM" class="wp-image-196357" style="aspect-ratio:1.5394748145814838;width:603px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM.png 1170w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-300x195.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-1024x665.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-768x499.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-36x23.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.01-PM-48x31.png 48w" sizes="auto, (max-width: 1170px) 100vw, 1170px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-implementation-of-a-receiver-agnostic-real-time-signal-cleaner-nbsp">Implementation of a Receiver-Agnostic, Real-Time Signal Cleaner&nbsp;</h3>



<p>Implementing the signal cleaner fully uses the real-time software approach under the Linux operating system. The main processing unit is a high-performance PC with a multi-core processor. A multi-threading method is used to increase computational speed. However, the processing limitation is the interconnection among multi-cores inside the processor that allows only 40% of the total cores (40 cores) to be used. These internal multicore bottlenecks limit the maximum sampling frequency to operate at 20MHz.&nbsp;<strong>Figure 16</strong>&nbsp;shows the schematic view of the developed signal cleaner system. Two receivers are used: “system” and “reference” receivers. The “system” receiver receives the signal after it&#8217;s processed by the system and the “reference” signal receives the signal directly from the GNSS antenna used for comparison. A circular buffer system continuously receives (RF), processes (IQ signal) and re-transmits (RF). We use three memory pointers to locate received, processed and transmitted data. In this buffering system, the processing time should be faster than the transmission time to make sure transmitted signal to a downstream receiver is continuous.&nbsp;</p>



<p>In summary, the final system building blocks consist of a GNSS RF antenna to capture RF GNSS signals (NavXperience 3G+C Reference with 49dB gain with power input &lt; 50mA), RF front-end (RFFE) based on SDR USRP X410 for RF capture and RF reply of GNSS signals, a processing, including storage, unit to process GNSS signals and implement jamming and/or spoofing detections and mitigations (Intel® Core&#x2122; i7 20-Core Processor i7 and 64GB RAM) and a GNSS COTS receiver (Septentrio AsteRx SB3 Pro+) as the downstream receiver to process the cleaned signal and provide PVT solutions.&nbsp;</p>



<p><strong>Figure 17</strong>&nbsp;shows the system’s real setup. After characterizing the RFFE device, an important component, the receiver noise is quantified to be 144.8dBm/Hz. The signal dynamic range of the RFEE is 65-75dB-Hz. Meanwhile, the input power dynamic range (where GNSS signal can be faithfully received) of the RFFE is about 85dBm=–50dBm to 135dBm. The transmitter power output is about 17dBm (at 50dB gain) and, by assuming linearity, the power output is –23dBm (at 10dB gain) and at –33dBm (at 0 dB gain).</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1164" height="584" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM.png" alt="Screenshot 2026-02-11 at 5.34.07 PM" class="wp-image-196358" style="aspect-ratio:1.9931781106332493;width:588px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM.png 1164w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-300x151.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-1024x514.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-768x385.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-24x12.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-36x18.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.07-PM-48x24.png 48w" sizes="auto, (max-width: 1164px) 100vw, 1164px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="248" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM.png" alt="Screenshot 2026-02-11 at 5.34.15 PM" class="wp-image-196359" style="aspect-ratio:4.710005256702296;width:631px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-300x64.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-1024x217.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-768x163.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-24x5.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-36x8.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.15-PM-48x10.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="712" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM.png" alt="Screenshot 2026-02-11 at 5.34.21 PM" class="wp-image-196360" style="aspect-ratio:1.6376763030432266;width:588px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-300x183.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-1024x625.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-768x469.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.21-PM-48x29.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1166" height="476" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM.png" alt="Screenshot 2026-02-11 at 5.34.31 PM" class="wp-image-196361" style="aspect-ratio:2.4496491387952246;width:585px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM.png 1166w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-300x122.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-1024x418.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-768x314.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-24x10.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-36x15.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.31-PM-48x20.png 48w" sizes="auto, (max-width: 1166px) 100vw, 1166px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-experiment-results-nbsp">Experiment Results&nbsp;</h3>



<p>The system is tested through experimental campaigns using real datasets obtained from Jammertest 2024 in Andøya, Norway (for jamming mitigation) and the TEXBAT dataset (for spoofing mitigation) by using a professional commercial GNSS receiver. The Jammertest dataset covers various types of jammers, including a low-powered chirp jammer, a ramp-up-and-down CDMA jammer, and a narrow-band jammer with a slow-varying center frequency.&nbsp;</p>



<h3 class="wp-block-heading" id="h-low-powered-jammer-attack">Low Powered Jammer Attack</h3>



<p>A low powered pulsed jammer (0.2W) with a clean first 90 seconds is replayed using a Spirent transmitter to both reference and develop a system receiver. Reference receiver performance was tested in two modes: a) internal mitigation on and b) internal mitigation off.&nbsp;<strong>Figure 18 (left)</strong>&nbsp;illustrates the signal detection performance as well as the Spectrogram of the jammed signal.&nbsp;</p>



<p>The interference observed in the given signal is pulsed interference. To evaluate the system’s interference characterization performance, we need to compare the system’s output with the ground truth. The interference appears only for a short duration and affects only a few samples, so we obtain the ground truth by dividing the signal into segments of 128 samples computing energy for each segment. If energy exceeds the manually adjusted threshold, interference is said to be detected in the segment. Otherwise, it’s not. The probability of detection by comparing the developed system output with an energy-based detector is 0.98 and the probability of false alarm is 0.08 if the complete signal is used for analysis. However, if we compute the probability of false alarm, the free part of the signal is 0.04. The performance comparison between the system and reference receiver is performed using average C/N<sub>0</sub>&nbsp;<strong>(Figure 18, right)</strong>.&nbsp;</p>



<p>The interference mitigation results in an approximate 5 dB-Hz gain in C/N<sub>0</sub>. Results show internal mitigation offers a 0.25 dB advantage in terms of C/N<sub>0</sub>&nbsp;as compared to block-box during the interference part of the signal. The block-box system itself introduces approximately 1.5 dB distortion in interference in the free part so the block-box algorithm will give approximately 1.25 dB gain if the block-box algorithm is implemented within the GNSS receiver.&nbsp;<strong>Table 5</strong>&nbsp;summarizes the impact of interference mitigation on a low powered jammer in terms of C/N<sub>0</sub>.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1174" height="660" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM.png" alt="Screenshot 2026-02-11 at 5.34.39 PM" class="wp-image-196362" style="aspect-ratio:1.778836609092714;width:662px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM.png 1174w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-300x169.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-1024x576.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-768x432.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.39-PM-48x27.png 48w" sizes="auto, (max-width: 1174px) 100vw, 1174px" /></figure>
</div>

<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1168" height="668" src="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM.png" alt="Screenshot 2026-02-11 at 5.34.45 PM" class="wp-image-196363" style="aspect-ratio:1.7485201327001887;width:633px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM.png 1168w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-300x172.png 300w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-1024x586.png 1024w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-768x439.png 768w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2026/02/Screenshot-2026-02-11-at-5.34.45-PM-48x27.png 48w" sizes="auto, (max-width: 1168px) 100vw, 1168px" /></figure>
</div>


<p><strong>Ramp-up Ramp-down jammer attack</strong></p>



<p>A CDMA type ramp-up ramp-down jammer superimposed on GNSS signals was replayed through Spirent. The jammer power was increased from -37 dBm with a step size of 2dBm to 47 dBm and back. The interference mitigation is performed in real-time using the developed system. The impact of interference mitigation in terms of extraction of position error and average C/N<sub>0</sub>&nbsp;is illustrated in&nbsp;<strong>Figure 19.&nbsp;</strong></p>



<p>Block-box based interference mitigation allows the receiver to track up to power levels of 31 dBm and restarts tracking at 13 dBm. The reference receiver with no interference mitigation can track up to 19 dBm and regain tracking at -3 dBm. The reference receiver with interference mitigation on state loses track around the 15 dBm jammer power level. It restarts tracking at the same time as the block-box based receiver but with a large position error.&nbsp;</p>



<h3 class="wp-block-heading" id="h-narrowband-interference">Narrowband Interference</h3>



<p>A jammer of power level 50W emitting a continuous wave that drifts from 1545 MHz to 1620 MHz in 15 minutes is added to a GNSS signal of a moving object. The instantaneous frequency of the jamming signal as it appears in the 10 MHz band is illustrated in&nbsp;<strong>Figure 20 (left).&nbsp;</strong>The developed system classifies the interference as periodic interference and detects it with the probability of detection equal to 0.99 with false alarm equal to 0.0023. The recorded signal is replayed through Spirent. The impact of interference mitigation in terms of the average C/N<sub>0</sub>&nbsp;is shown in&nbsp;<strong>Figure 20 (right).</strong></p>



<p>After 14:16, the block box achieves significant improvement over the reference receiver, as the reference receiver fails to estimate C/N<sub>0</sub>. The reference receiver’s performance deteriorates as the frequency of the interfering signal comes in the center of the L1 band. However, the GNSS receiver can effectively mitigate the interference and extract the position curve&nbsp;<strong>(Figure 21).&nbsp;</strong>Without interference mitigation, the complete path cannot be extracted.</p>



<p><strong>Spoofing TEXBAT ds3 dataset</strong></p>



<p>The spoofing mitigation experiments use the TEXBAT ds3 dataset [9], containing a spoofer with 1.3 dB higher power than the authentic signal. In this data set, a spoofer is injected from 120s and the spoofing starts approximately between 150 to 200s. This dataset contains spoofed GPS L1 signals, where a static receiver initially tracks an authentic signal before encountering a spoofer, resulting in a significant shift in the static location for approximately 50 seconds.&nbsp;<strong>Figure 22</strong>&nbsp;shows the results of the spoofing mitigation by using the impulse method. The spoofing mitigation shows a reduction in static position error by up to 70% while also improving the duration of position availability.&nbsp;</p>



<p>Results from both jamming and spoofing mitigation evaluations demonstrate the potential benefits of the developed system in providing clean signals to a wide range of receiver types.</p>



<h3 class="wp-block-heading" id="h-conclusion-and-future-work-nbsp">Conclusion and Future Work&nbsp;</h3>



<p>We have demonstrated that the developed real-time and receiver-agnostic jamming and spoofing detection and mitigation system is effective on real-world data. Potential applications for the system include securing GNSS stations that require continuous, jamming- and spoofing-free GNSS signal recordings to provide publicly accessible data, as well as safeguarding receivers for critical assets. The system has been validated using a professional GNSS receiver and a software receiver (GNSS-SDR). The system is flexible and configurable and can be used with different radio frequency front-end and processing unit devices. A novel variant of the developed adaptive notch filter can track fast time-varying chirps because of an additional post-processing step and mitigates interferences without causing non-linear phase distortions by employing zero-phase filtering. The novel spoofer mitigation technique can remove the spoofer component from the TEXBAT ds3 signal. The developed system has certain limitations, including restricted computational speed due to CPU constraints, reduced effectiveness when mitigating interference from multiple equally powerful chirp jammers, and is dependent on the receiver&#8217;s ability to initially track authentic signals as well as on specific signal structures for successful mitigation.&nbsp;</p>



<p>Future work will focus on testing with more spoofing scenarios to improve current mitigation algorithms, integrating feedback from receivers and other sources for spoofing detection and mitigation in wider scenarios and implementing jamming and spoofing detection and mitigation on field programmable grid array (FPGA) for fast processing to create a compact, portable system suitable for a wider range of applications including dynamic environments and moving assets.&nbsp;</p>



<h3 class="wp-block-heading" id="h-acknowledgment">Acknowledgment</h3>



<p>This work was funded by the European Space Agency (ESA) NAVISP program under the activity NAVISP-EL1-064: “Block-box for an optimized GNSS spectrum monitoring network using artificial intelligence.” We also acknowledge the support of ESA Technical Officer Luciano Musumeci for his contributions throughout the project. The views expressed can in no way be taken to reflect the official opinion of the ESA.&nbsp;</p>



<p>This article is based on material presented in a technical paper at ION GNSS+ 2025, available at ion.org/publications/order-publications.cfm.</p>



<p>References</p>



<p><strong>(1)&nbsp;</strong>Misra, P, Enge, P., “Global Positioning System: Signals, Measurement and Performance,” 2nd Edition, 2006, Ganga-Jamuna Press: USA.</p>



<p><strong>(2)&nbsp;</strong>Kaplan, E.D. and Hegarty, C., “Understanding GPS/GNSS: principles and applications,” 2017. Artech house.</p>



<p><strong>(3)&nbsp;</strong>Dovis, F., “GNSS interference threats and countermeasures,” 2015, Artech House.</p>



<p><strong>(4)&nbsp;</strong>Khan, Nabeel Ali, and Luis Enrique Aguado. “Adaptive Notch Filter based Interference Characterization and Mitigation for GNSS Receivers.” Proceedings of the 37th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2024). 2024.</p>



<p><strong>(5)&nbsp;</strong>Kormylo, J., &amp; Jain, V., “Two-pass recursive digital filter with zero phase shift,” 1974 IEEE Transactions on Acoustics, Speech, and Signal Processing, 22(5), 384-387.</p>



<p><strong>(6)&nbsp;</strong>Wesson, K.D., Shepard, D.P., Bhatti, J.A. and Humphreys, T.E., “An evaluation of the vestigial signal defense for civil GPS anti-spoofing.” In Proceedings of the 24th International Technical Meeting of the Satellite Division of the institute of navigation (ION GNSS 2011) (pp. 2646-2656) 2011, September.</p>



<p><strong>(7)&nbsp;</strong>Goodfellow, I., Bengio, Y., Courville, A. and Bengio, Y., “Deep learning,” 2016, Cambridge: MIT press.</p>



<p><strong>(8)&nbsp;</strong>Murphy, K.P., “Machine learning: a probabilistic perspective,” 2012. MIT press.</p>



<p><strong>(9)&nbsp;</strong>Humphreys, T.E., Bhatti, J.A., Shepard, D. and Wesson, K., 2012. The Texas spoofing test battery: Toward a standard for evaluating GPS signal authentication techniques.</p>



<p><strong>(10)&nbsp;</strong>Seco-Granados, G., Gómez-Casco, D., López-Salcedo, J.A. and Fernández-Hernández, I., “Detection of replay attacks to GNSS based on partial correlations and authentication data unpredictability,” 2021, Gps Solutions, 25(2), p.33.</p>



<p><strong>(11)&nbsp;</strong>Khan, A.M., Iqbal, N., Khan, A.A., Khan, M.F. and Ahmad, A., “Detection of intermediate spoofing attack on global navigation satellite system receiver through slope-based metrics,” 2020, The Journal of Navigation, 73(5), pp.1052-1068.</p>



<p><strong>(12)&nbsp;</strong>Negrinho, A., Boto, P., Fernandes, P., Mendonça, V., Nunes, F. and Sousa, F., “Signal Quality Monitoring Aspects in GNSS Signals Affected by Evil Waveforms,” In Proceedings of the 35th International Technical Meeting of the Satellite Division of The Institute of Navigation (ION GNSS+ 2022) (pp. 3947-3958), 2022, September.</p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Wahyudin P. Syam</strong>&nbsp;has worked on several ESA projects related to end-to-end GNSS transceivers at low frequency, GNSS spoofing, and machine learning for GNSS applications. His main roles at GMV are GNSS-related system development, software engineering and machine learning.</p>



<p><strong>Nabeel Ali Khan&nbsp;</strong>develops digital signal processing algorithms for applications involving signal detection, instantaneous frequency estimation, jammer interference characterization and mitigation, design of time-frequency representation, and positioning using signals of opportunity.</p>



<p><strong>Michael Turner</strong>&nbsp;is the lead engineer on several timing and navigation projects. He has published several papers on GNSS spoofing detection techniques and has two related patents in this area.</p>



<p><strong>Luis Enrique Aguado</strong>&nbsp;is a Section Head in the Assured and Resilient PNT Division at GMV. With a Ph.D. in digital communication from the University of Manchester, UK, he has been active<br>in GNSS technology developmentsince 2002.</p>



<p><strong>Ben Wales</strong>&nbsp;is a technical expert on GNSS systems and related technologies at GMV. With 20 years of experience in the PNT industry, he has been the architect and lead developer on numerous initiatives covering advanced PNT, snapshot positioning, PPP and signals of opportunity, amongst others.</p>



<p><strong>Lisa Guerriero</strong>&nbsp;has a BSc in Automation Engineering from Polytechnic of Milan. With over a decade of experience in embedded systems, she specializes in custom firmware development and real-time GNSS solutions. Since 2019, she has contributed to advanced PNT systems at GMV, with expertise in SDR technologies.</p>



<p><strong>Baris Toz</strong>&nbsp;has a MEng in Electronic and Communications Engineering from the University of Nottingham and hands-on experience in embedded systems, software development, and IoT technologies. He is skilled in low-level C programming, hardware-software optimization and system testing.</p>



<p><strong>Inchara Lakshminarayan</strong>&nbsp;is a navigation engineer at GMV and works on projects for ESA, DSTL, RSSB etc. on topics such as sensor fusion, integrity, reliability and safety. She holds a double master’s degree and a Ph.D. from the University of Minnesota and has previously worked for the location tech team at Qualcomm, USA.</p>



<p><strong>Tom Stacey&nbsp;</strong>has a BEng in Electrical and Electronic Engineering from Newcastle, UK, with a background in hardware design and digital signal processing. Since 2018, he has worked on several ESA projects and contributed to GNSS related systems hardware development.</p>



<p><strong>Maria Ivanovici</strong>&nbsp;is a Senior Project Manager at GMV. She is responsible for managing a variety of navigation related projects, ranging from product development to service delivery.</p>



<p><strong>Terri Richardson</strong>&nbsp;is the CANS-UK Section Head at GMV, where she works on several projects related to advanced GNSS positioning and integrity for user applications. She received a B.Sc. and M.Phil. in Surveying and Land Information from the University of the West Indies and a Ph.D. in Civil Engineering and Geodetic Science from The Ohio State University.&nbsp;</p>



<p>*EQUAL CONTRIBUTION</p>
<p>The post <a href="https://insidegnss.com/leveraging-advanced-ml-to-detect-and-mitigate-spoofing-and-jamming/">Leveraging Advanced ML to Detect and Mitigate Spoofing and Jamming</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>7 PNT Policy Myths </title>
		<link>https://insidegnss.com/7-pnt-policy-myths/</link>
		
		<dc:creator><![CDATA[Dana A. Goward]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 15:17:32 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[timing]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196321</guid>

					<description><![CDATA[<p>These misleading narratives are keeping the U.S. from advancing PNT policy, putting everyone who depends on GNSS at risk. Storytelling is the most...</p>
<p>The post <a href="https://insidegnss.com/7-pnt-policy-myths/">7 PNT Policy Myths </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>These misleading narratives are keeping the U.S. from advancing PNT policy, putting everyone who depends on GNSS at risk.</em></p>



<span id="more-196321"></span>



<p>Storytelling is the most powerful communication tool we have. Stories can inform and inspire. Stories can also mislead.</p>



<p>The biggest challenges to advancing PNT policy in the U.S. are false and misleading stories around the need for resilient PNT. These myths have frozen the nation in place for decades while our adversaries and allies have made tremendous advances. Here are some of the most pernicious and why they need to be eliminated from our discussions.</p>



<h3 class="wp-block-heading" id="h-1-gps-gnss-is-enough-nbsp">1. “GPS/GNSS is enough.”&nbsp;</h3>



<p>Of all the PNT policy myths, at least this one seems to be on the way to being dispelled.</p>



<p>It was certainly solidly in place in 2009. That’s when the National Space-based PNT Executive Committee’s decision to transform Loran-C to eLoran to meet a presidential mandate for a backup was overturned.</p>



<p>Bureaucrats, lobbyists and budgeteers refused to accept that the tens of billions of dollars invested in GPS, admittedly the most important, empowering and beneficial technology in the previous 40 years, hadn’t solved America’s utility-level PNT needs forever.</p>



<p>Today, most officials across the federal government familiar with the problem, including those in Congress, seem to have admitted the problem. Now, the challenges seem to be a lack of clarity about who is responsible for ensuring America has the resilient PNT it needs and how to get there.</p>



<p>This has likely been exacerbated by the abundance of non-GNSS PNT technologies developed in the last two decades. For some, more options seem to have made decisions more difficult.</p>



<h3 class="wp-block-heading" id="h-2-we-have-to-or-they-want-to-replace-gps">2. “We have to (or ‘they want to’) replace GPS.”</h3>



<p>Only someone deliberately trying to confuse things or who is entirely unfamiliar with the issues would propose “replacing GPS.”</p>



<p>GPS is an amazing system that will be the centerpiece of America’s PNT architecture for decades. There are an estimated 10 to 15 billion user devices across the world, far more than one for every person on the planet. GPS signals are an essential component of innumerable systems and applications. Not maintaining GPS for the foreseeable future is almost unimaginable, and certainly not practical.</p>



<p>Our efforts must be to complement and backup GPS/GNSS with other PNT. One or more widely adopted alternative sources will make GPS and other GNSS safer and more reliable in two ways.</p>



<p>First, it will “get the bullseye off GPS” by making satellites and signals much less desirable targets. If users are not impacted by interference, or impacts are greatly lessened, bad actors will have little reason to interfere. Over time, jamming and spoofing equipment will become less popular, less available and more expensive. A virtuous cycle will begin to nearly eliminate deliberate interference.</p>



<p>Second, users and their applications will be protected in the event of any interference with GPS/GNSS, malicious or not.</p>



<p>Ongoing non-malicious threats to GPS/GNSS also pose significant risk for users.&nbsp;</p>



<p>Accidental interference, while often low level and benign, is commonplace. Europe’s STRIKE3 project detected more than 450,000 signals that could interfere with GNSS reception. Only about 10% were judged to be deliberate.</p>



<p>And while the probabilities of events like severe solar activity and Kessler syndrome debris damage are low, those probabilities are greater than zero.</p>



<p>Our efforts must be to complement and backup GPS/GNSS, not replace it.</p>



<h3 class="wp-block-heading" id="h-3-more-study-is-needed">3. “More study is needed.”</h3>



<p>During World War II, America’s Office of Strategic Services published its “Simple Sabotage Manual” for agents embedded in adversary governments. It advised “Whenever possible refer all matters to committees for further study and consideration.”</p>



<p>While having more information is almost always good, looking for more when you already have enough is a classic way to avoid making decisions and taking action.</p>



<p>America’s growing over-dependence on GPS was formally recognized in a 1998 Presidential Decision Directive by President Bill Clinton. This resulted in the Department of Transportation’s Volpe Center producing a report in 2001 that validated a variety of concerns. It also predicted jamming and spoofing would be growing problems and recommended maintenance of terrestrial PNT capabilities.</p>



<p>Unfortunately, the report published only a few days before 9/11. So, it wasn’t until 2004 that President George W. Bush issued a mandate for a GPS backup. This, of course, generated another study.&nbsp;</p>



<p>But rather than be guided by the results of that study and others and fulfilling the mandate, subsequent administrations have continued to admire the problem.</p>



<p>There have been more than enough studies of GPS’s vulnerabilities and technologies that can provide complementary and backup services. Major efforts have included DOT’s 2001 Volpe report, a paper by the Institute for Defense Analysis in 2009, an extensive DOD/DHS/DOT analysis in 2014 (never made public), and another report by DOT in 2021.</p>



<p>And yet government PNT studies and analyses continue.</p>



<p>Again, continually increasing our store of knowledge is good, if that is what’s happening. But merely understanding the problem better will not solve it.</p>



<p>Two and a half decades of studies with similar findings are enough to inform action.&nbsp;</p>



<p>Leadership’s next steps must be establishing performance requirements for America’s resilient core PNT architecture and empowering an executive agent to ensure that architecture is put in place.</p>



<h3 class="wp-block-heading" id="h-4-it-s-all-about-infrastructure-protection">4. “It’s all about infrastructure protection.”</h3>



<p>“Infrastructure protection” has been a buzz phrase for decades. Infrastructure is important and we must protect it with resilient PNT. That won’t do the whole job, however, because what we really want is a secure and prosperous nation.</p>



<p>National security means domestic resilient PNT to underpin non-<br>infrastructure applications like Golden Dome, UAS operations, Counter-UAS operations, the many applications used by the defense industrial base, first responders, and the list goes on.&nbsp;</p>



<p>Likewise, there are far more contributors to the nation’s economy and prosperity beyond just infrastructure. Everything from the corner coffee shop and Uber drivers to complex factory SCADA systems need PNT.</p>



<p>Every American contributes to the economy in some way, and everyone needs PNT. If their PNT is not resilient, the economy and our prosperity are on a knife’s edge.&nbsp;</p>



<p>Protecting infrastructure is necessary, but not sufficient.</p>



<h3 class="wp-block-heading" id="h-5-we-just-need-to-educate-users">5. “We just need to educate users.”</h3>



<p>In 1964, the Surgeon General formally warned Americans about the dangers of smoking. At that time, 42% of Americans were smokers. In 1972, after eight years of warnings and education, 43% of Americans were smokers.</p>



<p>There is a big gap between knowing something and acting on that knowledge.</p>



<p>President Bush formally identified America’s lack of PNT resilience as a problem in December 2004 (and mandated a solution). President Trump issued Executive Order 13905 in February 2020 warning GPS users to get their own backup systems. Yet, in 2026 the nation’s PNT does not seem to be much more resilient.</p>



<p>Changing Americans’ PNT habits will require effort and expense, but most importantly leadership. Members of the National Space-based PNT Advisory Board, attendees of the September 2025 PNT Leadership Summit, and others have all concluded that leadership is the missing piece to addressing resilient PNT in the U.S.</p>



<h3 class="wp-block-heading" id="h-6-the-government-needs-to-build-nbsp-a-gps-backup-system">6. “The government needs to build&nbsp;a GPS backup system.”</h3>



<p>Nope. The government should not build anything. It should lead and, leveraging competition and America’s commercial sector to its best advantage, ensure something is built.</p>



<p>The government’s responsibility is to ensure Americans have easy access to a backup system and that it is widely adopted. There are several ways to do that including regulation, legislation, allowing public use of a system built to support government missions (ala GPS), and sponsoring a system in part or in whole.</p>



<p>If the latter method is selected, the process must include fair and open competition.&nbsp;</p>



<p>There are numerous mature and commercially available PNT systems that can be had as services. Once the government establishes performance requirements, it will be a relatively simple matter to let a multi-year service contract. Competition against clear requirements will eliminate the need for endless studies and provide the best value for the public dollar.&nbsp;</p>



<p>A long, expensive, and painful government major system acquisition must be avoided at all costs.</p>



<h3 class="wp-block-heading" id="h-7-the-market-will-provide-the-gps-backup-america-needs-government-doesn-t-need-to-do-anything">7. “The market will provide the GPS backup America needs. Government doesn’t need to do anything.”</h3>



<p>This is probably the most insidious of all the myths because it speaks to traditional American values of limited government and market economics. Yet, it shows a fundamental misunderstanding of the nature of GPS and PNT.</p>



<p>Some misunderstanding might be due to the existing and thriving market in specialized PNT services for high demand users. When there is a business case, commercial users do regularly pay for resilient PNT. Farmers subscribe for precision agriculture. Day traders pay for resilient nano and picoseconds. Shipping terminals contract for systems that place containers within millimeters.</p>



<p>But GPS, while it began as a military weapons system, quickly became a public utility. One that is integrated with and benefits every aspect of the economy. Government-provided utilities are not easily subject to market forces.</p>



<p>Where is the business case? Why would a potential PNT provider build a national system and try to get consumers to purchase what the government is already giving them for free?&nbsp;</p>



<p>And what would be the national benefit?</p>



<p>Even if such a company was to somehow survive, would enough Americans subscribe to really protect the economy from a long-term GPS outage? Would having a system that only a fraction of Americans accessed be enough to deter our adversaries from interfering or threatening to interfere with GPS and gain advantage over America?</p>



<p>The United States government has provided utility-level navigation since the formation of the Lighthouse Service in 1789. It has provided timing since the Naval Observatory began dropping a noon time-ball in 1845. Leaders understood that PNT is a fundamental economic driver. That’s why the Department of Commerce’s shield still features a lighthouse and why the department hosts the nation’s civil time scale at the National Institute of Standards and Technology.&nbsp;</p>



<p>GPS is merely the most recent way the government has provided America with utility-level PNT, and it has been spectacularly successful at boosting the economy.</p>



<p>Claiming the government has no role or responsibility for providing a utility-level backup capability for GPS might be an honest misunderstanding.</p>



<p>It might also be a way some commercial interests are trying to advance their own fortunes.&nbsp;</p>



<p>It might be how some government officials are trying to shirk what they see as difficult responsibilities.</p>



<p>Regardless, such claims are false and misleading. They continue to harm the nation and increase the risk to America’s security and prosperity.</p>
<p>The post <a href="https://insidegnss.com/7-pnt-policy-myths/">7 PNT Policy Myths </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Golden Dome and PNT </title>
		<link>https://insidegnss.com/golden-dome-and-pnt/</link>
		
		<dc:creator><![CDATA[Dana A. Goward]]></dc:creator>
		<pubDate>Tue, 09 Dec 2025 19:18:25 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=196057</guid>

					<description><![CDATA[<p>More than 50 years ago, the Department of Defense (DoD) began a PNT project to support deployed forces and “put five bombs in...</p>
<p>The post <a href="https://insidegnss.com/golden-dome-and-pnt/">Golden Dome and PNT </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>More than 50 years ago, the Department of Defense (DoD) began a PNT project to support deployed forces and “put five bombs in the same hole.” While not part of its original mission, signals from GPS are now accessed by and even more important to civil users. </p>



<span id="more-196057"></span>



<p>Today, the department may well be in the process of developing one or more resilient PNT systems to support defensive capabilities that will also benefit civil users.</p>



<h3 class="wp-block-heading" id="h-metro-golden-domes">Metro Golden Domes</h3>



<p>In a recent paper [1],&nbsp;&nbsp;the National Security Space Association (NSSA) outlined how resilient PNT is essential to the success of the President’s Golden Dome initiative.&nbsp;</p>



<p>In the popular imagination, Golden Dome is a virtual shield of systems protecting the U.S. from intercontinental ballistic missiles, hypersonic drones and the like. Much less well known is the project’s “inner, limited area, layer” to protect against UAS launched from American soil or just beyond our borders.&nbsp;</p>



<p>The NSSA paper describes this part of the project as “Metro Golden Domes.” They will be, according to many experts, much easier and less expensive to create than the system being designed to protect the whole county. Technologies to support these smaller scale systems are already commercially available, many from multiple vendors. While some integration of components may be required, protecting military bases and cities from drone attacks will not require the kinds of technological advances needed to “hit a bullet with a bullet” and reliably destroy incoming hypersonic missiles.</p>



<h3 class="wp-block-heading" id="h-a-single-point-of-failure">A Single Point of Failure</h3>



<p>One challenge that must be overcome for all the nation’s Golden Dome efforts to succeed, according to the NSSA paper, is America’s over-reliance on GPS.&nbsp;</p>



<p>The paper highlights three specific areas where more resilient, less deniable and less spoofable, PNT is required for Golden Dome success:</p>



<p><strong>Intelligence, Surveillance and Reconnaissance (ISR) and Sensor Platforms</strong>. As outlined in the paper, “Detecting and tracking adversarial systems in-flight can be challenging, and PNT solutions are critical to determining the ‘where’ and ‘when’ vital in ensuring effective intercept information in all phases of potential adversarial attacks.”</p>



<p><strong>Precision-Guided Interceptors.</strong>&nbsp;Whether it is a 100 foot-long Russian ICBM, or a 2 foot-wide drone with 10 pounds of explosive, defensive systems must strike difficult-to-hit targets. Precise timing is also essential to synchronizing various intercept system components.</p>



<p><strong>Command and Control Systems</strong>. Communication systems rely on precise timing for multiplex operations. IT systems need timing for synchronization and data tagging. PNT is essential for common operational pictures and other situational awareness tools.</p>



<p>NSSA’s paper concludes with several recommendations for General Michael Guetlein, Space Force’s leader of Golden Dome. They include clearly articulating requirements, establishing an organization and leader for Golden Dome PNT, developing user equipment early, and establishing a “PNT improvement budget” with the goal of “deploying improvements within the next three years.”</p>



<p>The paper’s conclusion also pleads for a focus on integration, highlighting the interconnectedness of all components and their reliance on PNT as an invisible tech utility:&nbsp;</p>



<p>“Integration across systems that Golden Dome is dependent upon, systems that protect Golden Dome, and Golden Dome specific systems are essential to avoid electronic fratricide, system interference, and degraded system performance. Each of these systems is dependent upon common PNT frequencies, signals and enablers that Golden Dome will also seek to defeat in an adversary system. The adversary will also be employing counter-PNT systems, and those adversary systems must be thwarted.”</p>



<h3 class="wp-block-heading" id="h-a-national-core-resilient-pnt-architecture">A National Core Resilient PNT Architecture</h3>



<p>GPS and one or two easily adoptable complementary and backup PNT systems could constitute a national core resilient PNT architecture. Senior administration officials and policy documents have periodically called for systems to complement and back up GPS for the last two decades. In 2018, Congress enacted legislation requiring the Department of Transportation to establish a terrestrial timing system to help back up GPS.&nbsp;&nbsp;</p>



<p>Yet, highly diffused responsibility for civil PNT within the administration and the absence of a broad public demand for solutions has meant little progress. At the same time, America’s principal adversary, China, has established a highly effective and resilient PNT architecture that includes multiple satellite constellations, terrestrial broadcast, and hundreds of synchronized timing stations connected by 20,000 kilometers of fiber.&nbsp;</p>



<p>Golden Dome may provide the opportunity to overcome America’s bureaucratic challenge with PNT. The DoD is not responsible, nor does it budget for, systems to benefit and protect domestic infrastructure and applications. Yet a defense capability, like GPS, can also support civil users.&nbsp;</p>



<p>Highly resilient PNT is a key enabler for Golden Dome and for making a host of civil applications—autonomy, transportation, IT, telecom, and the like—more reliable and scalable. As Golden Dome solves its resilient PNT needs, it should also benefit civil users, making America even more efficient, safe and secure.&nbsp;</p>



<h3 class="wp-block-heading" id="h-references">References </h3>



<p>1. “Resilient PNT is Vital to Golden Dome Success” <a href="https://www.c4isrnet.com/opinion/2020/07/20/gps-interference-crashed-a-survey-drone-in-the-uk-will-the-debate-resonate-in-the-us/">https://www.c4isrnet.com/opinion/2020/07/20/gps-interference-crashed-a-survey-drone-in-the-uk-will-the-debate-resonate-in-the-us/</a></p>



<p></p>
<p>The post <a href="https://insidegnss.com/golden-dome-and-pnt/">Golden Dome and PNT </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Thoughts on Leadership: Escaping the Trap of Backwards Compatibility</title>
		<link>https://insidegnss.com/thoughts-on-leadership-escaping-the-trap-of-backwards-compatibility/</link>
		
		<dc:creator><![CDATA[Logan Scott]]></dc:creator>
		<pubDate>Thu, 04 Dec 2025 21:13:26 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=195968</guid>

					<description><![CDATA[<p>The PNT industry must adapt to a changing landscape and find a way to provision for continual improvement. Why SDR architectures may be...</p>
<p>The post <a href="https://insidegnss.com/thoughts-on-leadership-escaping-the-trap-of-backwards-compatibility/">Thoughts on Leadership: Escaping the Trap of Backwards Compatibility</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The PNT industry must adapt to a changing landscape and find a way to provision for continual improvement. Why SDR architectures may be the answer. </p>



<span id="more-195968"></span>



<p>In Ernest Hemingway’s “The Sun Also Rises” Mike is asked how he went bankrupt. His response: “Two ways, gradually and then suddenly.”</p>



<p>It is increasingly obvious that GPS is falling behind when compared with the European Union’s (EU) Galileo and China’s BeiDou Navigation Satellite System (BDS). There are many opinions as to why, but one theme echoed by many is it’s because GPS was first. It has the least modern signal designs and therefore has the least capabilities.&nbsp;</p>



<p>Requirements to maintain backward compatibility impose heavy burdens on any attempts at modernization and so, we fail to progress, weighed down by a half century of legacy baggage. The opportunity costs are immense. The L1 C/A signal was designed 53 years ago, has numerous deficiencies, and still, a 45-year-old receiver will operate with current broadcast signals (or spoofing variants). I’m of the opinion that software defined radio (SDR) architectures present an opportunity to escape the tyranny of unbounded backwards compatibility—but only if carefully managed.&nbsp;</p>



<h3 class="wp-block-heading" id="h-the-sdr-opportunity-nbsp">The SDR Opportunity&nbsp;</h3>



<p>At this year’s ION GNSS+ plenary, the European Space Agency’s (ESA) Marco Falcone, when asked about future directions for Galileo, observed that ESA needs to better coordinate with receiver manufacturers. Thinking about it more deeply, when both satellites and receivers are SDR, it presents important opportunities to better manage the retirement of obsolescent or failed signals and, instead, move toward a paradigm of continual and planned improvement cycles. Installed hardware can stay the same because signal upgrades are software upgrades. This is particularly true with civil signals, as the associated receivers are mostly connected, minimally via a USB port. The “PNT solver” in your cell phone is mostly an SDR.</p>



<p>Using the PC industry as a parallel, specific signals might have minimum required SDR capability. Think of minimum A/D conversion rate, minimum number of correlators, minimum required RF memory, etc. And of course, there needs to be requirements for hardware authentication of software loads and machine-readable signal specifications [1] using an industry standard like the trusted platform module (TPM). Similarly, like an OS, generous advance warning as to when support for a particular signal release is ending, such as we are turning it off or we are upgrading the message format, and so forth.&nbsp;</p>



<h3 class="wp-block-heading" id="h-a-different-approach-nbsp">A Different Approach&nbsp;</h3>



<p>Looking toward the cellular industry for inspiration, they recognized they had a serious innovation problem more than 30 years ago. Two important outcomes were the genesis of SDR and the standardization of release cycles. Every 2 years, there is a “major release” where specifications for new capabilities are rolled out. The process has been phenomenally successful, leading to several orders of magnitude improvements in data rates. The 3G signal, state of the art in 2001 when first broadcast, was decommissioned in 2022. Staged improvements within each generation pay more attention to backwards compatibility but again, the lifetime of a signal is limited. Each generation is an opportunity to revitalize the enterprise.</p>



<p>At this point, many of you may be thinking this approach may work for cellular but not for safety critical PNT systems requiring onerous certifications. Think of commercial aviation. A 2-year major release cadence is probably too fast, but what about 5 years or 10 years? I think it is doable but requires a considered approach.&nbsp;</p>



<p>Toward this end, signal modifications fall into roughly 3 categories:</p>



<p><strong>1. Backwards Compatible:&nbsp;</strong>These are modifications that are fully backwards compatible with receivers designed to use prior signal generations. Examples include new message types for data authentication, code puncturing for range authentication ala. Chimera, emergency warning services ala. Galileo’s Emergency Warning Satellite Service, and so forth.&nbsp;</p>



<p><strong>2. Digital Impact:</strong>&nbsp;This is where digital aspects of a signal are redesigned to achieve an important objective but with the caveat that the modulation format is not changed. A BPSK(1) signal remains BPSK(1), but without the burden of backwards compatibility. Using GPS as an exemplar:&nbsp;</p>



<p>• Except for L1C, the forward error correction (FEC) on civil signals is antiquated. L1 C/A doesn’t have FEC at all and the non-interleaved convolutional codes used on L2C and L5 offer greatly inferior performance when compared with 4G and 5G FEC standards (TS36.212 and TS38.212 respectively). Substantial performance gains in scintillation, rapid fading, pulsed interference and in Eb/No are possible. Bit rates can be increased to support enhanced message content.&nbsp;</p>



<p>• The Keplerian curve fit representations developed in the 1970s provides point solutions for satellite position given time. Much better, bit-efficient, long-term orbit representations are now available [2] where medium Earth orbits (MEO) can be accurately conveyed for up to a week with less than 1-meter errors at the end of the week. Propagating the orbit forward in time requires more computations, but when combined with active clock steering on the satellite, using such a representation can have major impacts on receiver power consumption because regular data reading is not required. Occasional snapshots collecting a few milliseconds of RF are fine for many applications, such as asset monitoring, IoT applications and hiking.</p>



<p>• Short code sequences have been good for acquisition but bad for structured interference response. L1 C/A code is efficiently jammed using structured Gold code jamming. Longer codes and/or concatenated secondary sequences offer major improvements and can be handled readily by modern receiver designs.</p>



<p><strong>3. Analog Impact:</strong>&nbsp;Changes to a signal’s modulation format or its center frequency have direct impacts on a receiver or transmitter’s interaction with the signal and with the environment. Multipath characteristics shift. Filter effects shift. Antenna effects on observables like carrier phase and pseudorange also shift, especially when using CRPAs. Any changes to a signal’s format that impact analog characteristics need to be considered very carefully but not out of hand rejected. OFDM, CPM and multi-h formats[3]have great merit, but tread cautiously.&nbsp;</p>



<p>Returning to a prior point, what is a failed signal? L2C was first broadcast in 2005 with CNAV messaging starting in 2014. It has seen limited adoption mainly because it is in a less protected frequency band and because the L5 signal is more capable in dual frequency applications. L2C is not a bad design, it just doesn’t provide a distinct capability. Rather than continue with L2C, I would argue for an L2 signal that does something different. For example, a secure ranging signal for civil users to use in spoofing mitigation, authentication and proofs of location.</p>



<p>I would also add there is no substitute for live sky testing. SDR development paradigms have repeatedly shown the power of being able to fix design flaws by changing the signal structure. Operational SDR satellites can broadcast experimental and regional signals as part of their transmit portfolio. Design flaws can be worked out in the laboratory of real life. Without SDR, it can take years to fully understand operational weakness in a signal’s design. With SDR, you can fly it before you buy it.</p>



<h3 class="wp-block-heading" id="h-future-proofing-nbsp">Future Proofing&nbsp;</h3>



<p>GNSS operators must find a way to provision for continual improvement. The ideas presented here are in nascent form, but I do believe they point toward a way to break the tyranny of backwards compatibility. The GPS Block III satellites are expected to be 35 years on orbit. Needs and requirements change much faster, witness the “sudden need” for civil signal authentication. SDR offers a mechanism for future proofing, but only if we employ carefully engineered approaches for managing and fielding innovation. We must adapt, or face technical bankruptcy, first gradually, then suddenly. </p>



<h3 class="wp-block-heading" id="h-references-nbsp">References&nbsp;</h3>



<p><strong>(1)&nbsp;</strong>Sanjeev Gunawardena “A High Performance Easily Configurable Satnav SDR for Advanced Algorithm Development and Rapid Capability Deployment,” ION ITM 2021 https://doi.org/10.33012/2021.17808.</p>



<p><strong>(2)&nbsp;</strong>Oliver Montenbruck et.al. 2020, DOI: 10.1002/navi.404 “A long-term broadcast ephemeris model for extended operation of GNSS satellites.”</p>



<p><strong>(3)&nbsp;</strong>Logan Scott, “Continuous Phase Modulation for Navigation” ION JNC2017.</p>



<h3 class="wp-block-heading" id="h-author">Author</h3>



<p><strong>Logan Scott</strong>&nbsp;has over 45 years of military and civil GPS systems engineering experience. He is a consultant specializing in radio frequency signal processing and waveform design. Logan has been an active advocate for improved civil GPS location assurance for over 20 years and was the first to describe how civil navigation signals could be authenticated using delayed key concepts central to the Chimera signal. For the past 10 years, he has been developing advanced signal concepts, including Chimera for NTS-3, AFRL and the University of Colorado. He is a Fellow of the Institute of Navigation and a Senior Member of IEEE. He received ION’s Weems award in 2022 and the Kepler award in 2025 and is a member of the National PNT Advisory Board. He is the author of “Interference: Origins, Effects, and Mitigation in PNT21” and holds 46 U.S. patents.</p>
<p>The post <a href="https://insidegnss.com/thoughts-on-leadership-escaping-the-trap-of-backwards-compatibility/">Thoughts on Leadership: Escaping the Trap of Backwards Compatibility</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>PNT Summit Report 2025: Tackling Urgent PNT Challenges</title>
		<link>https://insidegnss.com/from-defending-a-system-to-stewarding-an-architecture/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 19:43:47 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=195935</guid>

					<description><![CDATA[<p>Thought leaders recently gathered to discuss the growing threats to GPS, the most pressing challenges the industry faces and the best way forward....</p>
<p>The post <a href="https://insidegnss.com/from-defending-a-system-to-stewarding-an-architecture/">PNT Summit Report 2025: Tackling Urgent PNT Challenges</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Thought leaders recently gathered to discuss the growing threats to GPS, the most pressing challenges the industry faces and the best way forward. Here, we’ve put together a comprehensive view of all the critical issues tackled during the PNT Leadership Summit, a venue where the industry’s brightest minds could bring up their concerns, frustrations and recommend solutions.</p>



<span id="more-195935"></span>



<p>Forty miles from the nation’s Capital, a closed-door convening of operators, engineers, program leaders and policy architects from both sides of the Atlantic arrived at a shared conclusion: The United States must stop defending a single PNT source and begin stewarding a resilient architecture. That shift—from reliance to resilience—demands governance that certifies trust, authentication embedded within both data and devices, and layered modalities proven to coexist in the real world. It also calls for coordinated integration steps that operators can advance now.</p>



<p>The inaugural PNT Leadership Summit, co-hosted by&nbsp;<em>Inside GNSS+&nbsp;</em>and the Resilient Navigation and Timing Foundation, gave industry thought leaders an opportunity to openly discuss the many challenges facing PNT and how to best address them—urgently. This is the PNT Leadership Summit’s record in full: what participants agreed upon, what operators require and how strategic posture becomes operational practice.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="588" height="494" src="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM.png" alt="Screen Shot 2025-12-04 at 2.24.55 PM" class="wp-image-195961" style="width:240px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM.png 588w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM-300x252.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM-24x20.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM-36x30.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.24.55-PM-48x40.png 48w" sizes="auto, (max-width: 588px) 100vw, 588px" /></figure>



<h3 class="wp-block-heading" id="h-setting-the-scene-nbsp-when-confidence-slips-systems-stall">Setting the Scene:&nbsp;When Confidence Slips, Systems Stall</h3>



<p>It did not look like catastrophe. It looked like drift—at scale.</p>



<p>On an ordinary weekday over Europe, dispatchers watched confidence margins ripple across air routes. No airport went dark; instead, trust eroded—quietly, then widely. Crews re-briefed arrivals, spacing widened, alternates were opened.&nbsp;</p>



<p>In the Baltics, autonomous rubber-tired gantries at the Port of Gdańsk—core assets in a multi-billion dollar modernization—dropped out of precision modes in bursts that operators associated with activity out of Kaliningrad. Offshore, a wind-farm contractor halted survey and cable-lay work because five-centimeter tolerances dissolved into guesswork. These were not headline “outages.” They were worse for business: degraded confidence. In time-synchronized, safety critical industries, degraded confidence is outage.</p>



<p>“Availability is not the bar anymore,” an airline systems engineer told the room during the summit. “Trusted availability is.”</p>



<p>The summit returned to the same fulcrum: Single-source certainty has collapsed. Threats are cheap, clever and deniable. Dependencies have deepened into automation and synchronization. Stewardship is fragmented. The remedy is not to declare GPS “broken,” but to stop asking a single modality to carry national trust alone. The United States must move from defending a signal to assuring a system—a layered architecture blending protected and modernized GNSS, authenticated messages, terrestrial timing, inertial continuity, low Earth orbit (LEO) signals, and operator-visible monitoring.</p>



<p>This architecture already exists in pieces. The task is to knit it into practice—quickly enough that ports, airlines, rail operators, telecoms, emergency services and national security customers can run on confidence they can demonstrate, not merely assume.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1144" height="418" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM.png" alt="Screenshot 2025-11-25 at 11.13.45 AM" class="wp-image-195938" style="width:588px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM.png 1144w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-300x110.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-1024x374.png 1024w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-768x281.png 768w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-24x9.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-36x13.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.45-AM-48x18.png 48w" sizes="auto, (max-width: 1144px) 100vw, 1144px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-why-now-the-transition-nbsp-from-dependence-to-resilience">Why Now: The Transition&nbsp;from Dependence to Resilience</h3>



<p>For decades, GPS was both capability and assumption. The comfort of ubiquity displaced the discipline of resilience. Researchers at the summit noted European interference events—well-known and long-standing—have increased in both frequency and duration, with degradations reaching up to 10 dB and showing patterns consistent with sustained jamming and intermittent spoofing activity. Whether accidental or deliberate, the operational effect was the same: confidence dropped, and the costs cascaded into scheduling, safety buffers and throughput.</p>



<p>A port automation executive put it plainly: “We either make layered assurance boring and baseline, or we keep treating risk as a surprise.”</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="608" height="464" src="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM.png" alt="Screen Shot 2025-12-04 at 2.25.05 PM" class="wp-image-195962" style="width:274px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM.png 608w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM-300x229.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM-24x18.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM-36x27.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.05-PM-48x37.png 48w" sizes="auto, (max-width: 608px) 100vw, 608px" /></figure>



<p>Across multiple sessions during the summit, practitioners reframed the problem. The nation is not defending signals; it is defending a dependency. That dependency runs through aviation separation minimums, rail signaling, port logistics, grid operations, wireline and wireless synchronization, public safety dispatch, financial sector time-stamping, and even basic intermodal&nbsp;<br>logistics. You don’t solve it by hardening a single source; you reduce the operational damage from jamming and spoofing by embedding diversity beneath trust.</p>



<p>During the summit, seven strategic pillars emerged that can serve as guidance as we move from a single-modality system to an assured architecture with multiple layers of resilience.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1142" height="376" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM.png" alt="Screenshot 2025-11-25 at 11.13.59 AM" class="wp-image-195940" style="width:586px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM.png 1142w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-300x99.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-1024x337.png 1024w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-768x253.png 768w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-24x8.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-36x12.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.13.59-AM-48x16.png 48w" sizes="auto, (max-width: 1142px) 100vw, 1142px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-strategic-pillar-1-recognizing-the-inflection-point">STRATEGIC PILLAR 1: Recognizing the Inflection Point</h3>



<p>Summit participants discussed the three forces that have converged to put an end to single-modality comfort:&nbsp;</p>



<p><strong>1.</strong>&nbsp;Threat accessibility has collapsed. It no longer takes a national lab to trigger operational disruption: jammers are inexpensive, spoofing tools are portable, and on-orbit anomalies propagate through the same timing chains that sustain modern infrastructure. Yet, the burden of proof in live operations remains uncomfortably high. Before classifying an event as interference, operators must rule out equipment faults, atmospheric effects or coincidence—an analysis requiring multi-sensor data and time they rarely have. Declaring a jamming or spoofing incident carries operational and political consequences, so confirmation thresholds remain higher than the pace of impact. The result is a paradox: Disruption is easy to cause, but difficult to prove quickly enough to act on.</p>



<p><strong>2.</strong>&nbsp;Dependency has deepened. Precision and synchronization are no longer enhancements; they are the substrate of modern operations. Throughput, safety and efficiency across sectors now depend on continuous, trusted time and position. The models behind these systems presume stability—and when that stability falters, delays, buffers and uncertainty ripple through everything built upon it.</p>



<p><strong>3.</strong>&nbsp;Stewardship has fragmented. The responsibility to sustain confidence has diffused across agencies, sectors and vendors—each accountable for its own slice of performance, but not for the coherence of the whole. Aviation, maritime, telecom, energy and defense each buy to their own standards, test to their own tolerances, and report to their own regulators. The result is a patchwork of compliant subsystems that do not add up to an assured architecture. When governance is scattered, trust becomes everyone’s assumption and no one’s assignment.</p>



<p>The inflection point is not rhetorical. It is operational. A breakdown in availability is no longer required to create national risk; a breakdown in trust is sufficient. In real fleets, real towers and real control rooms, trust is the throttle.</p>



<p>“If confidence dips, we slow,” a tower manager said. “Slow is safer. Slow is also expensive.”</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="536" height="758" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM.png" alt="Screenshot 2025-11-25 at 11.14.09 AM" class="wp-image-195941" style="width:252px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM.png 536w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM-212x300.png 212w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM-17x24.png 17w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM-25x36.png 25w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.09-AM-34x48.png 34w" sizes="auto, (max-width: 536px) 100vw, 536px" /></figure>



<h3 class="wp-block-heading" id="h-strategic-pillar-2-governance-as-the-foundation-nbsp-of-resilience">STRATEGIC PILLAR 2: Governance as the Foundation&nbsp;of Resilience</h3>



<p>The summit’s most surprising agreement was not technical. It was institutional. The gap is less about invention and more about locus. When responsibility is scattered, risk is inherited rather than reduced. Participants converged around a governance spine with three parts:</p>



<p><strong>1.</strong>&nbsp;A Clearinghouse that certifies trust, not brands. The Department of Transportation’s (DOT) complementary PNT action plan lays out a pragmatic arc: stakeholder engagement; specifications and standards; instrumented field test ranges (rapid&nbsp;→&nbsp;continuity&nbsp;→&nbsp;gap-fill); and a federal PNT Services Clearinghouse that lets agencies and critical infrastructure buyers procure fitness-for-purpose solutions against actual operating profiles and threat models.</p>



<p>The first tranche of rapid testing covered mature satellite- and ground-based offerings. A follow-on tranche adds modalities such as ELORAN and additional timing systems. Measures of effectiveness are sharpened with each run. Results feed the Clearinghouse first as a government resource; industry visibility will grow as standards and formats harden.</p>



<p>A government program lead summarized the intent:&nbsp;</p>



<p>“Normalize claims into comparable evidence. Tie standards to tested behaviors. Give buyers a map.”</p>



<p><strong>2.</strong>&nbsp;Centralized test and certification that travels. Participants argued for a certification regime that is mission-tiered rather than monolithic: certify to the threat model, the use case, and the failure consequences—not to the most exacting edge case. Standards bodies like the Society of Automotive Engineers (SAE) and others are already active; the ask is to couple standards work to test ranges and a government-facing database so procurement offices can act on schedules that make sense.</p>



<p>An industry veteran put it in old-school terms:&nbsp;</p>



<p>“Underwriters Laboratories changed product safety by testing to standards, not slogans. Do that for PNT.”</p>



<p><strong>3.</strong>&nbsp;A portfolio-based governance and an escalation path—not a czar. This point required deliberate clarification during the summit. The group agreed: A “PNT czar” is a quick-fix temptation that historically fails.&nbsp;It centralizes symbolic responsibility without structural authority, invites bureaucratic resistance, and creates a sense among senior leaders that the problem has been “assigned” rather than addressed. But a governance home—an accountable locus—is essential.</p>



<p>A collaborative leader with authority, funding and an interagency mandate is necessary to:</p>



<p>• maintain the portfolio of complementary PNT systems,</p>



<p>• adjudicate interagency conflicts,</p>



<p>• escalate through the National Space Council or National Security Council when needed, and</p>



<p>• synchronize standards, funding and release cadence across departments.</p>



<p>The resolution is simple: Avoid the czar model, but establish a empowered stewardship—multi-agency, portfolio-based, and backed by budget signals that endure.</p>



<p><strong><em>Policy Reality&nbsp;</em></strong></p>



<p>Inside the Executive Branch, the real levers are familiar: NSpC, NSC, OSTP, OMB, and cross-council groups that blend security, commerce and infrastructure. The advice from those who have worked inside these bodies was blunt: arrive with a plan, certification evidence, and a budget number that signals seriousness.</p>



<p>On Capitol Hill, churn and committee fragmentation dilute long-term memory. Vehicles like the NDAA can carry language, but only if the ask is unified, costed and tied to mission need. The National Timing Resilience and Security Act is a cautionary tale: mandates without champions, authority and funding fade into reports.</p>



<p>Governance, in other words, is the foundation. Everything else depends on getting it right here.</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="492" height="448" src="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM.png" alt="Screen Shot 2025-12-04 at 2.25.29 PM" class="wp-image-195963" style="width:221px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM.png 492w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM-300x273.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM-24x22.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM-36x33.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.29-PM-48x44.png 48w" sizes="auto, (max-width: 492px) 100vw, 492px" /></figure>



<h3 class="wp-block-heading" id="h-strategic-pillar-3-architecture-over-capability">STRATEGIC PILLAR 3: Architecture Over Capability</h3>



<p>A backup you cannot compose operationally is theater. The architecture view treats diverse sources as composable trust, not ornamental redundancy.</p>



<p><strong><em>Authenticate the Data</em></strong></p>



<p>Europe’s Open Service Navigation Message Authentication (OSNMA) is now operational for Galileo’s open service. The next step—Signal Authentication Service (SAS) on E6—aims to extend authenticated signaling further. One EC engineer cautioned that receiver makers must implement authentication correctly: “Do it poorly and you’ve bought false security. You’ll feel safer but won’t be.”</p>



<p><strong><em>Harden GPS Receivers Via Data Rails</em></strong></p>



<p>Summit participants pointed to Europe’s authentication service as a model. A comparable service for GPS, they argued, could raise robustness, accuracy and spoof resistance even for civil receivers. Such authenticated data rails form the connective tissue of an architectural approach—linking satellites, networks and receivers through verifiable trust. The U.S.’s National Space-based Positioning, Navigation and Timing Advisory Board has been advocating for such a system for years. In 2023 they even produced a white paper “GPS High Accuracy and Robustness Service (HARS),” outlining how it could be done using exisiting government data and resources. The obstacle is the needed data and resources exist across several government departments. Without an effective advocate, breaking the stovepipes has been impossible.The call from the room was clear: “Someone in government needs to stand it up and make it happen.&#8221;</p>



<p><strong><em>Diversity as Architecture,&nbsp;Not Redundancy</em></strong></p>



<p>LEO PNT improves signal strength through geometry and refresh; terrestrial time delivers provenance and independence; inertial continuity bridges gaps; signals of opportunity (SOOP) complicate jammers’ lives; cross-links and optical links raise integrity and monitoring. All of them protect it by making it less of a desirable target while protecting users by ensuring loss (or doubt) in any one source does not collapse the system.</p>



<p>“Continuity arises from plurality, not reinforcement,” a national-lab engineer said. “If the architecture does its job, no single path carries trust alone.”</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="602" height="328" src="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM.png" alt="Screen Shot 2025-12-04 at 2.25.42 PM" class="wp-image-195964" style="width:275px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM.png 602w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM-300x163.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screen-Shot-2025-12-04-at-2.25.42-PM-48x26.png 48w" sizes="auto, (max-width: 602px) 100vw, 602px" /></figure>



<h3 class="wp-block-heading" id="h-strategic-pillar-4-integration-as-invention">STRATEGIC PILLAR 4: Integration as Invention</h3>



<p>The bottleneck is not ingenuity. It is integration—and much of what matters can move now. Summitt participants called to:</p>



<p>•&nbsp;<strong>Set L5 healthy and move through aviation certification.&nbsp;</strong>Multiple voices labeled L5 a near-term priority for both performance and resilience. Aviation wants a clean path to operational use.</p>



<p>•&nbsp;<strong>Unrestrict nulling/multi-element antennas.</strong>&nbsp;A 19-element array that can dull multiple jammers is not science fiction. Several attendees urged removing remaining civil constraints so high-exposure sectors can field proven anti-jam techniques legally and at scale.</p>



<p>•&nbsp;<strong>Finish and field the Operational Control Segment (Next Generation GPS Control System), known as OCX.&nbsp;</strong>Program leaders described formal test phases under way. The goal is a seamless command-and-control cutover with better integrity behaviors and modern cybersecurity—so end-users notice nothing except improved assurance.</p>



<p>•&nbsp;<strong>Stand up an augmentation server.</strong>&nbsp;One architect priced a backbone network—feeding sovereign ephemeris—at roughly $25 million to stand up and $15 million per year to operate. That’s compared to $400 million for a single satellite block and about $6 billion for a control segment. For a fraction of the cost of a next-generation satellite, a modest terrestrial backbone could deliver years of measurable resilience and interoperability.</p>



<p>•&nbsp;<strong>Adopt software defined receivers (SDR)—with discipline.&nbsp;</strong>Software-defined architectures plus satellite cross-links make the system more updateable, monitorable and integrity-aware. They also require governance guardrails—version control, conformance testing, provenance for updates—so agility does not become chaos.</p>



<p>A participant from the user community offered the cultural nudge the program world needed: “Behave like the cellular industry—major releases on a cadence. No more learned helplessness.”</p>





<h3 class="wp-block-heading" id="h-strategic-pillar-5-adoption-as-infrastructure">STRATEGIC PILLAR 5: Adoption as Infrastructure</h3>



<p>Resilience is real where operations live. Three adoption vectors dominated the discussion:</p>



<p><strong>1.</strong>&nbsp;Build the common operating picture. DOT elements, Space Force teams and the FAA are knitting data and tools—National PNT Architecture Synchronization (NPAS), the GNSS Operational Awareness Tool (GOAT), academic toolchains like SkAI—toward a picture operators can actually use. A retired official urged the group to “call the GOAT team—keep it moving toward a public-facing view.” The idea is simple: Give ports, railroads, airlines, and telcos visibility into the environment they operate in—interference seen, anomalies flagged, confidence quantified—so they can adjust before incident reviews.</p>



<p><strong>2.</strong>&nbsp;Map your dependencies; rehearse your response. Critical National Infrastructure (CNI) owners were told to build connectivity maps showing exactly where and how GNSS/PNT enters systems, and then to write mitigation playbooks for each failure mode: jam, spoof, degrade, ambiguous confidence, loss of authentication, and so on. Color-code by severity and time-to-response. Then run fire drills—tabletop and live—annually.&nbsp;</p>



<p><strong>3.</strong>&nbsp;Sector exemplars (the difference between theory and practice)</p>



<p>•&nbsp;<strong>Aviation is framing continuity and authentication as safety properties:</strong>&nbsp;If confidence dips below well-understood thresholds, the system responds automatically.</p>



<p>•&nbsp;<strong>Ports/maritime are shifting</strong>&nbsp;from vessel-only augmentation to port-scale assurance, treating timing as throughput infrastructure. Yard management systems, quay cranes and autonomous vehicles all need synchronized trust.</p>



<p>•&nbsp;<strong>Rail/surface operators</strong>&nbsp;are pairing inertial with terrestrial timing to stabilize signaling and automation during RF anomalies.</p>



<p>•&nbsp;<strong>Telecom</strong>&nbsp;is formalizing multi-sourced time and provenance in contracts, audits and change-control practices. In several cases, time Service Level Agreements (SLAs) are being written in language that chief risk officers can live with.</p>



<p>“Expectation—not mandate—is what converts resilience into default behavior,” a port CTO said. “But nothing changes until the cost of fragility is visible.”</p>



<h3 class="wp-block-heading" id="h-strategic-pillar-6-nbsp-making-resilience-routine">STRATEGIC PILLAR 6:&nbsp;Making Resilience Routine</h3>



<p>Pillar 6 is where governance becomes practice—the point at which layered assurance stops being innovative and starts being expected. If Pillar 2 builds the spine, Pillar 6 establishes the behaviors that run along it.</p>



<p>•&nbsp;<strong>Certification that travels.&nbsp;</strong>A government-facing Clearinghouse, fed by instrumented ranges and linked to consensus standards, provides portable, comparable evaluations. Procurement officers can specify mission-tiered requirements and reference actual performance, not marketing claims. This reduces bespoke one-offs and shortens time to field.</p>



<p>•&nbsp;<strong>Tailored requirements.</strong>&nbsp;Stop forcing every system to meet the highest-consequence use case.</p>



<p>• Timing distribution for the grid</p>



<p>• Sub-meter positioning for ports</p>



<p>• Centimeter-class precision for aviation or robotics</p>



<p>Each has different threat models and failure consequences. Mission-tiered certification acknowledges this and lowers barriers to adoption.</p>



<p>•&nbsp;<strong>Public-private collaboration that accelerates scale.</strong>&nbsp;Venture-backed firms and new entrants need clear on-ramps—evaluation tiers, reciprocal testing windows, and export-control relief where appropriate—to turn innovation into infrastructure.</p>



<p>•&nbsp;<strong>Insurance and risk pools.&nbsp;</strong>Insurers and reinsurers remain largely unaware of PNT fragility because losses have not been priced. Engagement with Lloyd’s and others—paired with operator attestations (dependency maps, drill logs, provenance checks)—can shift behavior faster than statute. If a port can prove layered continuity and rehearsed response, its premiums, covenants and board expectations change.&nbsp;</p>



<p>Normalization happens when:</p>



<p>• Certification is portable</p>



<p>• Provenance is contractual</p>



<p>• Integrity is measurable</p>



<p>• Dependencies and drills are expected</p>



<p>This is where continuity stops being exceptional and becomes the baseline.</p>



<p>A broadcast executive in the room volunteered airtime for public education and incident reporting. “Awareness follows consequence,” he said. “Let’s show the public what resilience looks like before the teachable moment.”</p>



<h3 class="wp-block-heading" id="h-strategic-pillar-7-securing-long-term-resilience">STRATEGIC PILLAR 7: Securing Long-Term Resilience</h3>



<p>Pillar 7 is about durability—ensuring resilience can&#8217;t be unwound without re-creating systemic risk. Governance builds the structure; normalization creates the habit; institutionalization embeds both into policy, budgets and operational identity.&nbsp;</p>



<p><strong>1.</strong>&nbsp;Sustain governance through long-term budget commitments.&nbsp;</p>



<p>Governance establishes responsibility, authority and structure. Long-term resilience requires stable, multi-year funding so the governance functions created in Pillar 2—testing, certification, monitoring and integration—remain viable across budget cycles. Recurring appropriations prevent core resilience mechanisms from eroding or reverting to discretionary status.</p>



<p><strong>2.</strong>&nbsp;Maintain plurality as policy.</p>



<p>Plurality—independent and diverse sources of timing, position, authentication and monitoring—must be maintained as an ongoing policy requirement. This prevents the system from drifting back to single-modality dependence as programs change or budgets tighten.</p>



<p><strong>3.</strong>&nbsp;Align resilience with legislative and regulatory windows.&nbsp;</p>



<p>Several resilience actions depend on timing. Effective institutionalization requires aligning PNT initiatives with specific legislative or regulatory windows, such as air-traffic-control modernization or sector rulemaking cycles, so that durable language and requirements can be incorporated when those windows open.</p>



<p><strong>4.</strong>&nbsp;Apply international models where relevant.&nbsp;</p>



<p>Other nations provide working examples of how institutional resilience can be maintained. The UK’s National PNT Office, national timing center, multi-year performance targets, vendor-interrogation tools, and structured Prepare→Act&nbsp;→Recover framework demonstrate practical approaches for embedding resilience in operations and governance.</p>



<h3 class="wp-block-heading" id="h-international-lessons">International Lessons</h3>



<p>Brexit forced the UK to reset. Out of Galileo and the European Geostationary Navigation Overlay Service (EGNOS), they stood up an in-government National PNT Office, partnered with the Royal Institute of Navigation, and funded a national timing center—“hundreds of millions,” one official said—with a three-year horizon to sub-five-meter performance. They coupled policy with working tools:</p>



<p>•&nbsp;<strong>A three-phase Prepare&nbsp;</strong>→<strong>&nbsp;Act&nbsp;</strong>→<strong>&nbsp;Recover</strong>&nbsp;best-practices guide with a strong bias toward testing in “Prepare.”</p>



<p>• A&nbsp;<strong>10-point questionnaire</strong>&nbsp;CNI buyers can use to interrogate vendors’ resilience claims—what’s your authenticated path, your inertial continuity story, your timing provenance, your failure modes?</p>



<p>•&nbsp;<strong>Workshops that build muscle memory:</strong>&nbsp;mapping dependencies, running drills, writing playbooks, and—crucially—sharing mistakes after incidents so others improve.</p>



<p>The tone was never triumphalist. It was practical. “We’ll bring the training,” the UK team said. “You bring the process owners and a whiteboard.”</p>



<h3 class="wp-block-heading" id="h-modernization-authentication-nbsp-and-partnership">Modernization, Authentication&nbsp;and Partnership</h3>



<p>No one argued to “out Galileo.” The argument was for assurance and partnerships. Participants want to:&nbsp;</p>



<p>• Use Galileo’s global monitoring to authenticate GPS L1 C/A data—technical readiness near 2027, subject to coordination.</p>



<p>• Define and budget a Resilient GPS (RGPS) concept that includes modern civil signals and yields early benefits even as requirements mature. Today, there is no dedicated RGPS line; tomorrow there should be a plan that starts small, proves value, and expands in annual releases.</p>



<p>• Keep L5 on a glidepath to “healthy” and move through aviation certification steps.</p>



<p>• Harden the user segment without delay—multi-element antennas, practical anti-jam measures, authentication support in receivers—legally available to civil sectors that need them most.</p>



<p>An architect made the analogy many found helpful: “Think of GPS as the core stack. Authentication, terrestrial time, LEO geometry, inertial continuity—these are the libraries you link. The outcome isn’t a prettier core; it’s a system where no single import can crash the program.”</p>



<h3 class="wp-block-heading" id="h-terrestrial-leo-and-time-nbsp-widening-the-trust-base">Terrestrial, LEO and Time:&nbsp;Widening the Trust Base</h3>



<p>The most encouraging technical trend was the breadth of credible contributors to trust:</p>



<p>•&nbsp;<strong>ELORAN</strong>&nbsp;has moved from panel talk to projects. Miniaturized receivers were demoed in Singapore; a standardization push for aviation and maritime is under way; transportable systems are being invited to ranges for testing.</p>



<p>•&nbsp;<strong>LEO PNT</strong>&nbsp;efforts emphasized inner-satellite and optical links as enablers of timing and ephemeris robustness. Allied partners—Canada, Austria, Australia—are treating LEO not as a novelty but as a backbone element for integrity.</p>



<p>•&nbsp;<strong>National timing cells</strong>&nbsp;bring timing provenance into the same sentence as safety and throughput. In the UK case, sustained funding and a three-year target forced clarity: who operates it, who certifies it, how it’s measured in daily service, and how it fails safe.</p>



<p>These contributions are not about showcasing superiority; they are about minimizing shared modes of failure. By diversifying geometry, timing and authentication paths, we make adversaries’ work harder and our own systems more sustainable.</p>



<h3 class="wp-block-heading" id="h-transition-to-execution-build-nbsp-nbsp-normalize-nbsp-nbsp-institutionalize">Transition to Execution: Build&nbsp;→&nbsp;Normalize&nbsp;→&nbsp;Institutionalize</h3>



<p>The PNT Leadership Summit closed with an implementation arc designed to be simple yet difficult to derail: Build what already works, normalize it into expectation and institutionalize it so it can&#8217;t be unwound without re-creating systemic risk.</p>



<p><strong>PHASE 1—Build</strong></p>



<p>• Flip L5 to healthy status and push through the aviation steps.</p>



<p>• Remove civil constraints on nulling/multi-element antennas in high-exposure sectors; publish guidance on configurations and legal use.</p>



<p>• Stand up the augmentation server (the inexpensive backbone that feeds sovereign ephemeris and “safe use” rails for foreign GNSS).</p>



<p>• Advance GOAT/NPAS toward a public common operating picture that operators can actually action.</p>



<p>• Start authentication at scale (use OSNMA where available; prepare receivers and operations for E6 SAS).</p>



<p><strong>PHASE 2—Normalize</strong></p>



<p>• Launch the central test and certification facility; publish mission-tiered certification tracks that align to sector safety cases and threat models.</p>



<p>• Require dependency maps and annual fire-drills in regulated CNI (ports, telecom, aviation first), with reporting that insurers and auditors can rely on.</p>



<p>• Bake provenance and integrity SLAs into public procurement and regulated-vendor contracts; make “multi-sourced time” and “authenticated position” measurable.</p>



<p>• Align insurer and lender covenants to reward layered deployments and penalize opaque dependencies and untested plans.</p>



<p><strong>PHASE 3—Institutionalize</strong></p>



<p>• Create (or designate) a federal stewardship structure—portfolio-based, with budget and acquisition authority—to sustain architectural resilience across domains.</p>



<p>This is not a “czar” model; it requires coordinated, long-term leadership backed by senior officials and durable funding to ensure resilience remains a standing national requirement.</p>



<h3 class="wp-block-heading" id="h-closing-synthesis-nbsp-resilience-becomes-imperative">Closing Synthesis:&nbsp;Resilience Becomes Imperative</h3>



<p>The PNT Leadership Summit did not diminish GPS; it clarified its position as essential but insufficient. The system the nation depends on is broader than any single signal or constellation. Confidence will grow only when trust is distributed, authentication is routine, time is verified, continuity is assured, testing is standardized, guidance is clear, and funding is stable. The community is not satisfied with the current state, nor should it be. Yet the alignment of views expressed throughout the summit reflects a rare moment of clarity. Resilience has shifted from concern to obligation. The task now is to deliver it—deliberately, transparently and with long-term responsibility.&nbsp;</p>



<figure class="wp-block-image size-full is-resized"><img loading="lazy" decoding="async" width="528" height="760" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM.png" alt="Screenshot 2025-11-25 at 11.14.20 AM" class="wp-image-195942" style="width:252px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM.png 528w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM-208x300.png 208w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM-17x24.png 17w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM-25x36.png 25w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.14.20-AM-33x48.png 33w" sizes="auto, (max-width: 528px) 100vw, 528px" /></figure>
<p>The post <a href="https://insidegnss.com/from-defending-a-system-to-stewarding-an-architecture/">PNT Summit Report 2025: Tackling Urgent PNT Challenges</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Washington View: PNT Threats, Risks and Disaster </title>
		<link>https://insidegnss.com/washinton-view-pnt-threats-risks-and-disaster/</link>
		
		<dc:creator><![CDATA[Dana A. Goward]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 16:57:00 +0000</pubDate>
				<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[Galileo]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=195945</guid>

					<description><![CDATA[<p>Assessing the risk to GNSS and what could happen if we fail to act.&#160; In many situations, the biggest threat is not the...</p>
<p>The post <a href="https://insidegnss.com/washinton-view-pnt-threats-risks-and-disaster/">Washington View: PNT Threats, Risks and Disaster </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>Assessing the risk to GNSS and what could happen if we fail to act.&nbsp;</em></p>



<span id="more-195945"></span>



<p>In many situations, the biggest threat is not the biggest risk. Failure to understand that and focusing on what appears to be the most pressing concern can lead to disaster.</p>



<p>A classic example is flood preparedness in New Orleans before Hurricane Katrina.&nbsp;</p>



<p>The biggest flood threat to the city has always been frequent intense rains from tropical and other storms. These often overwhelm the city’s stormwater management system. Streets and low-lying areas typically flood for a few hours, though sometimes it takes a day or more for the system’s pumps and drains to catch up. This happens so frequently it has become a fact of life. Residents have adapted by avoiding low areas and protecting their property as much as possible.</p>



<p>Yet, New Orleans’ biggest flood risk has always been a Category 5 Hurricane overtopping and destroying levees. While these storms only strike once every hundred years, their impact is devastating.&nbsp;</p>



<p>Before Katrina, New Orleans had guarded against its greatest flood threat, but not its greatest risk. When Katrina struck, that error cost 3,000 lives and $125 billion in property damage.</p>



<h3 class="wp-block-heading" id="h-pnt-threats-and-risks-nbsp">PNT Threats and Risks&nbsp;</h3>



<p>Localized GPS jamming and spoofing is the biggest threat to PNT services in America and Europe. Local and regional jamming and spoofing has become a fact of life and users are adapting by altering their behavior and, in some cases, upgrading equipment.&nbsp;</p>



<p>The biggest risk to PNT services is by most reckonings some form of long-term GNSS denial. Not the widespread, relatively low impact interference seen today. Yet, it&#8217;s been a challenge for Western governments to act to avoid a Katrina-like PNT disaster spread across multiple continents, a disaster it will take decades or more to recover from.&nbsp;</p>



<h3 class="wp-block-heading" id="h-risk-assessment">Risk Assessment</h3>



<p>Structured risk assessments are one way to help leaders and their support staff focus on these kinds of issues.</p>



<p>At a high level, most methodologies assess risk from a potential adverse event as the product of threat: the probability of the adverse event; vulnerability, or the degree the impacted system or population is likely to suffer damage; and consequence, which is the amount of damage likely to occur if no mitigations are in place. Expressed as an equation:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="294" height="14" src="https://insidegnss.com/wp-content/uploads/2025/12/1.png" alt="1" class="wp-image-195946" srcset="https://insidegnss.com/wp-content/uploads/2025/12/1.png 294w, https://insidegnss.com/wp-content/uploads/2025/12/1-24x1.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/1-36x2.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/1-48x2.png 48w" sizes="auto, (max-width: 294px) 100vw, 294px" /></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p>The risk equation for potential malicious acts is slightly more complex. Threat is defined as the probability a bad actor can commit the act (capability) multiplied by the probability the bad actor will actually carry out the act (intent). This makes the risk equation for malicious acts:</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="252" height="34" src="https://insidegnss.com/wp-content/uploads/2025/12/2.png" alt="2" class="wp-image-195947" srcset="https://insidegnss.com/wp-content/uploads/2025/12/2.png 252w, https://insidegnss.com/wp-content/uploads/2025/12/2-24x3.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/2-36x5.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/2-48x6.png 48w" sizes="auto, (max-width: 252px) 100vw, 252px" /></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h3 class="wp-block-heading" id="h-risk-assessment-challenges">Risk Assessment Challenges</h3>



<p>Barriers to risk assessment include:&nbsp;</p>



<p><strong>Estimating consequences.&nbsp;</strong>A significant obstacle to analyzing larger potential events is the difficulty of predicting consequences. For example, the pre-Katrina estimate of potential storm damage was less than 10% of what actually occurred.</p>



<p>Widespread, long-term GNSS denial is a much larger potential event and estimating consequence is much more problematic.&nbsp;</p>



<p>A good example of this is a 2019 study sponsored by the U.S. government examining the economic impact of losing GPS. It found an outage would cost the national economy $1 billion per day. While, at first glance, that seems a large number, it represented less than a 1.7% reduction in Gross Domestic Product (GDP). This is a very low consequence for a technological utility described by a member of the U.S. National Security Council as “a single point of failure” for the nation. By comparison (though admittedly not entirely analogous), a 2021 power outage in Texas cost $28 billion a day and 57 lives over a week.&nbsp;</p>



<p>It may not be possible to accurately predict and quantify the damage major societal disruptions cause. Multiple types of impacts, the interconnectedness of infrastructures, and the variety of human responses are highly complex and may be unknowable.&nbsp;</p>



<p><strong>Non-quantifiable consequences.</strong>&nbsp;The biggest challenge, perhaps, is many impactful consequences can’t be quantified. What cost can be assigned to a government collapsing, to a nation being coerced, or the loss of prestige and influence with other nations?</p>



<p>These challenges might make risk assessment seem not worth it, but it is. The more impactful the potential outcomes, the more important it is for leaders to take a deliberate, thoughtful approach.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="457" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-1024x457.png" alt="Screenshot 2025-11-25 at 11.10.07 AM" class="wp-image-195948" style="width:683px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-1024x457.png 1024w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-300x134.png 300w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-768x343.png 768w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-24x11.png 24w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-36x16.png 36w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM-48x21.png 48w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.10.07-AM.png 1152w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-pnt-risk-long-term-gnss-denial">PNT Risk: Long Term GNSS Denial</h3>



<p>The risk of long term GNSS denial is such a case. While good quantitative data may not be available or very difficult to obtain, there are things we know about the different elements of this risk equation. These help tell an impactful story and should inform decision-making.</p>



<p><strong>Threat:</strong>&nbsp;Various possible adverse events can result in GNSS not being available to Western nations for extended periods or indefinitely. They include:&nbsp;</p>



<p><strong>Severe Solar Activity:</strong>&nbsp;Researchers predict powerful solar events that can disrupt signals for days or destroy satellites occur once every 200 to 300 years. While these events are very low probability, the probability is greater than zero.&nbsp;</p>



<p><strong>Electronic Warfare/ Cyber:</strong>&nbsp;The West’s adversaries have impressive terrestrial electronic warfare and cyber capabilities and are demonstrating them every day. These capabilities are also being moved into spaces where they are even more impactful. The non-zero probability of long-term GNSS denial to the West as the result of heightened world tensions, an autocrat’s whim, or open conflict amongst world powers must be considered.</p>



<p><strong>Kinetic+</strong>: Several nations have or are developing capabilities to damage or destroy GNSS satellites. Press reports about Russian space-based nuclear weapons, Chinese satellite proximity operations, directed energy weapons, and the like show these must be considered in the overall risk.</p>



<p><strong>Western Weakness:</strong>&nbsp;In November 2021, while preparing to invade Ukraine, Russia destroyed one if its defunct satellites with a ground-based missile. The next day, state media claimed that if NATO crossed Russia’s “red line,” Moscow would shoot down all 32 GPS satellites and blind the alliance. This may or may not have influenced U.S. policy and subsequent actions. Shortly after Russia’s public statement, though, the U.S. administration announced it would not send certain types of aid to Ukraine to “avoid provoking a Russian invasion.” A continued lack of PNT resilience in the West opens the door to further attempts at coercion.&nbsp;</p>



<p><strong>Vulnerability:</strong>&nbsp;Most Western nations have no systemic PNT alternatives and are vulnerable to the loss of GNSS. While some alternate timing and location capabilities are in place for some applications, widely available, easily adoptable alternatives are not. If access to GNSS was denied long term, the probability of significant damage is very high.</p>



<p><strong>Consequence:</strong>&nbsp;The impact of long-term GNSS denial on Western nations would be severe. GNSS signals have been incorporated into virtually every infrastructure and most IT applications. Dependencies and linkages are so numerous, complex and intricate, a complete quantitative assessment of impacts is likely unattainable.</p>



<p>Qualitative consequences would almost certainly include severe economic disruption, civil unrest, and greatly reduced ability to field and support military operations—all contributing to domestic instability and enabling adversaries to dictate terms and otherwise influence events on the global stage.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="1146" height="1440" src="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM.png" alt="Screenshot 2025-11-25 at 11.09.51 AM" class="wp-image-195949" style="width:536px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM.png 1146w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-239x300.png 239w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-815x1024.png 815w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-768x965.png 768w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-19x24.png 19w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-29x36.png 29w, https://insidegnss.com/wp-content/uploads/2025/12/Screenshot-2025-11-25-at-11.09.51-AM-38x48.png 38w" sizes="auto, (max-width: 1146px) 100vw, 1146px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-what-s-it-worth">What&#8217;s it Worth?</h3>



<p>The threat of long-term GNSS denial to the West is greater than zero. Deciding how much greater is a matter of subjective judgement that will vary from person to person depending on their knowledge, background and biases. Yet, all must agree the probability must be considered.</p>



<p>Vulnerability is also a subjective and difficult judgement. How do we estimate the degree infrastructure, individual users, security forces and economies, are already protected? Is the West 90% vulnerable? Perhaps 80%? It is another unknowable number, but thinking about it and testing some hypotheses is important.</p>



<p>Consequence may be the most difficult element of the equation. What are the monetary and non-monetary costs of major societal disruptions? Are there meaningful ways to express them?</p>



<p>Perhaps a better way to look at the public policy question is to ask “what’s it worth?” How much are we willing to spend to reduce this risk? How should we spend it to get the maximum reduction?&nbsp;</p>



<p>Some companies say they can provide a national terrestrial PNT system to complement and backup GPS for less than $90 million a year. Presumably, the government could then better encourage and, perhaps in some cases, mandate greater resilience. What would the risk reduction be? Is it worth the cost?</p>



<h3 class="wp-block-heading" id="h-mitigation-no-silver-bullet">Mitigation: No silver bullet</h3>



<p>It is never possible to eliminate risk, but there are ways to reduce it. Users can purchase better equipment and access alternative sources of time and location when able. Companies can better understand the criticality of PNT, their use of GNSS, and try to improve resilience.&nbsp;</p>



<p>At the national level, we all must help leaders understand PNT is essential. Over-relying on GNSS poses unacceptable risk, setting the stage for disaster.&nbsp;</p>



<p>A former boss of mine once said, “Good public policy is hard work…but only if you do it.” We need to get busy and do it.</p>
<p>The post <a href="https://insidegnss.com/washinton-view-pnt-threats-risks-and-disaster/">Washington View: PNT Threats, Risks and Disaster </a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Can Satellite-based Radionavigation be Extended to the Moon and Other Extraterrestrial Bodies?</title>
		<link>https://insidegnss.com/can-satellite-based-radionavigation-be-extended-to-the-moon-and-other-extraterrestrial-bodies/</link>
		
		<dc:creator><![CDATA[Inside GNSS]]></dc:creator>
		<pubDate>Fri, 03 Oct 2025 18:13:08 +0000</pubDate>
				<category><![CDATA[Aerospace and Defense]]></category>
		<category><![CDATA[Columns and Editorials]]></category>
		<category><![CDATA[GNSS (all systems)]]></category>
		<category><![CDATA[GPS]]></category>
		<category><![CDATA[Home Slider]]></category>
		<category><![CDATA[PNT]]></category>
		<category><![CDATA[SBAS and RNSS]]></category>
		<guid isPermaLink="false">https://insidegnss.com/?p=195715</guid>

					<description><![CDATA[<p>What are the key challenges to lunar radionavigation, and how can they be addressed? KEIDAI IIYAMA, SAM PULLEN AND GRACE GAO, STANFORD UNIVERSITY...</p>
<p>The post <a href="https://insidegnss.com/can-satellite-based-radionavigation-be-extended-to-the-moon-and-other-extraterrestrial-bodies/">Can Satellite-based Radionavigation be Extended to the Moon and Other Extraterrestrial Bodies?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><em>What are the key challenges to lunar radionavigation, and how can they be addressed?</em></p>



<span id="more-195715"></span>



<p><strong>KEIDAI IIYAMA, SAM PULLEN AND GRACE GAO</strong>, STANFORD UNIVERSITY</p>



<p>Interest in establishing a sustainable human presence on the Moon has grown significantly in the last 20 years, with more than 200 missions planned over the next decade. To support these activities, robust positioning, navigation and timing (PNT) services are essential both on the lunar surface and in orbit. NASA and its international partners are developing a “network of networks” known as LunaNet designed to provide communications, PNT, detection and science services across the lunar environment [1].</p>



<p>This article reviews current proposals for LunaNet and its international partners: Moonlight (ESA) and LNSS (JAXA). It examines the technical challenges faced by lunar PNT and highlights emerging solutions from Stanford’s Navigation and Autonomous Vehicles (NAV) Lab, including orbit determination and time synchronization (ODTS) algorithms, spreading code design, differential carrier-phase techniques, rover navigation, and autonomous fault monitoring.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="591" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-1024x591.png" alt="Screenshot 2025-08-29 at 1.21.59 PM" class="wp-image-195720" style="width:774px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-1024x591.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-300x173.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-768x443.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-36x21.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM-48x28.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.21.59-PM.png 1172w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-lunanet-pnt-services">LunaNet PNT Services</h3>



<p>LunaNet envisions two classes of PNT services:</p>



<p>•&nbsp;<strong>Point-to-Point (P2P) Navigation,</strong>&nbsp;which delivers PNT through direct communication links between a provider and user.&nbsp;</p>



<p>•&nbsp;<strong>Lunar Augmented Navigation Service (LANS),</strong>&nbsp;which broadcasts navigation signals—augmented forward signals (AFS)—to lunar users. LANS is the lunar counterpart to terrestrial GNSS.</p>



<p>To provide these services, a lunar system must overcome fundamental challenges in constellation design, ODTS, and navigation message definition.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="564" height="604" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM.png" alt="Screenshot 2025-08-29 at 1.22.06 PM" class="wp-image-195721" style="width:374px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM.png 564w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM-280x300.png 280w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM-22x24.png 22w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM-34x36.png 34w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.06-PM-45x48.png 45w" sizes="auto, (max-width: 564px) 100vw, 564px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-key-challenges-in-lunar-pnt">Key Challenges in Lunar PNT</h3>



<p>Lunar PNT systems must address several unique challenges compared with terrestrial GNSS:</p>



<p><strong>Orbital Dynamics and Satellite Geometry</strong></p>



<p>Terrestrial GNSS relies on circular orbits that provide stable, global coverage. Around the Moon, however, strong third-body perturbations from Earth destabilize most circular orbits, requiring frequent station-keeping. Early deployments will also prioritize coverage of the lunar South Pole. Elliptical Lunar Frozen Orbits (ELFOs), which offer long-term stability under three-body perturbations and continuous South Pole visibility, are strong candidates for navigation satellites.</p>



<p><strong>Satellite Orbit Determination and Time Synchronization (ODTS)</strong></p>



<p>Accurate ODTS is essential for LANS, as errors directly propagate into user equivalent range error (UERE). Current requirements specify 40 m (95%) for position and 10 mm/s (95%) for velocity. Terrestrial GNSS achieves ODTS using ground monitoring stations distributed worldwide, but establishing an equivalent network on the Moon is prohibitively expensive in the early stages of LunaNet. Alternative frameworks must therefore rely on Earth-based ground stations or onboard ODTS approaches (e.g., exploiting GNSS sidelobe signals).</p>



<p><strong>Ephemeris Message Definition</strong></p>



<p>Navigation satellites broadcast orbital parameters (ephemerides) that allow users to compute satellite positions at any desired epochs. Terrestrial GNSS ephemerides are based on Keplerian elements with harmonic corrections. For lunar orbits, however, more appropriate parameterizations are required to accurately capture elliptical, perturbed trajectories while minimizing ephemeris message size.&nbsp;</p>



<p><strong>Reference Frames and Time Scales</strong></p>



<p>Terrestrial GNSS is referenced to Earth’s geoid and GPS time. Lunar PNT requires definitions of both a geodetic reference frame and a standard time scale. Two frames are currently in use—the Mean Earth (ME) frame and the Principal Axis (PA) frame—but a single standard must be adopted or a new one established. For time reference, LunaNet proposes to define LunaNet Reference Time (LRT), aligned with the AFS signals, which will link to Coordinated Lunar Time (LTC) referenced to the lunar geoid.</p>



<p><strong>Operation and Integrity Monitoring</strong></p>



<p>Navigation services for safety-critical applications, such as lunar landings and human surface operations, require robust integrity monitoring. As with terrestrial GNSS, signal quality can degrade due to satellite clock drift, unflagged maneuvers, payload failures, or code–carrier incoherence. These anomalies may be detected at surface monitoring stations, onboard satellites, or by receivers using Receiver Autonomous Integrity Monitoring (RAIM). However, in the near term, lunar systems will face limited surface stations and sparse satellite visibility, complicating the application of existing integrity monitoring methods.</p>



<p><strong>Receiver-Side Algorithms</strong></p>



<p>Receivers must also adapt to lunar constraints. With only one or two satellites visible during early deployments, rovers cannot rely on standard snapshot solutions requiring four or more signals. Instead, receiver algorithms must integrate navigation signals with onboard sensors (e.g., IMUs, cameras) to achieve reliable localization.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="768" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-1024x768.png" alt="Screenshot 2025-08-29 at 1.22.14 PM" class="wp-image-195722" style="width:517px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-1024x768.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-300x225.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-768x576.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-24x18.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-36x27.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM-48x36.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.14-PM.png 1170w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-satellite-navigation-systems-under-development-lcrns-nasa-lcns-esa-and-lnss-jaxa">Satellite Navigation Systems under Development: LCRNS (NASA), LCNS (ESA) and LNSS (JAXA)</h3>



<p>Lunar navigation capability is being advanced in parallel by NASA, ESA and JAXA. Each agency is preparing to deploy satellites broadcasting Augmented Forward Signals (AFS) in support of the LANS. NASA’s Lunar Communication Relay and Navigation System (LCRNS), ESA’s Lunar Communications and Navigation System (LCNS) under the Moonlight program, and JAXA’s Lunar Navigation Satellite System (LNSS) will serve as the first AFS providers under the LunaNet framework.</p>



<p>To ensure interoperability, the agencies are coordinating through the LunaNet Interoperability Specification (LNIS), which defines common standards for service interfaces, navigation messages, and time references. The most recent update, LNIS Version 5, establishes the baseline requirements for interoperable lunar PNT services [2].</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><img loading="lazy" decoding="async" width="562" height="658" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM.png" alt="Screenshot 2025-08-29 at 1.22.20 PM" class="wp-image-195723" style="width:285px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM.png 562w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM-256x300.png 256w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM-20x24.png 20w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM-31x36.png 31w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.20-PM-41x48.png 41w" sizes="auto, (max-width: 562px) 100vw, 562px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-satellite-orbits-initial-focus-on-lunar-south-pole">Satellite Orbits: Initial Focus on Lunar South Pole</h3>



<p>The first operational service volume targets latitudes south of 70° up to an altitude of 200 km, reflecting the high-priority needs of lunar South Pole missions. To minimize satellite numbers while maintaining coverage and long-term orbital stability, LCRNS and LNSS plan to deploy spacecraft in elliptical lunar frozen orbits (ELFOs). ESA’s first Moonlight satellite, Lunar Pathfinder, will also be positioned in ELFO to provide early relay and navigation services.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="733" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-1024x733.png" alt="Screenshot 2025-08-29 at 1.22.25 PM" class="wp-image-195724" style="width:549px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-1024x733.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-300x215.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-768x550.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-24x17.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-36x26.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM-48x34.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.25-PM.png 1174w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-assets-for-operation">Assets for Operation</h3>



<p>Each agency is developing supporting infrastructure for orbit determination (OD), time synchronization (TS), and system operation:</p>



<p><strong>NASA (LCRNS):&nbsp;</strong></p>



<p>LCRNS satellites will carry the LCRNS PNT Instrument (LPI), consisting of a GPS receiver, stable clock, and an onboard ODTS filter that estimates position, velocity and clock offset. In May, the LuGRE mission successfully demonstrated the tracking of GPS and Galileo signals in lunar orbit and on the lunar surface. NASA also plans to establish three Lunar Earth Ground Stations (LEGS) at White Sands Missile Range (WSMR) in the U.S., South Africa and Western Australia, enabling direct-to-Earth communication. With pseudorandom noise ranging and 1-/2-way X-band Doppler tracking, LEGS will support both user services and ODTS of lunar satellites.</p>



<p><strong>ESA (LCNS):&nbsp;</strong></p>



<p>ESA has proposed ATLAS (Advanced Tracking and Location Architecture for the Moon), a dedicated tracking and timing network that integrates ground and potential lunar assets. ATLAS aims to deliver orbit and clock accuracy at the tens-of-meters and nanosecond levels, respectively. ESA also plans NOVAMOON, a differential reference station near the lunar South Pole, designed to provide decimeter-level accuracy across the region. Equipped with a Mini-RAFS clock and laser retroreflector, NOVAMOON will also serve as a lunar time and geodetic reference.</p>



<p><strong>JAXA (LNSS):</strong></p>



<p>JAXA plans to leverage GNSS sidelobe signals for orbit determination and synchronization, reducing ground dependency and enabling autonomous navigation in cislunar space.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="555" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-1024x555.png" alt="Screenshot 2025-08-29 at 1.22.31 PM" class="wp-image-195725" style="width:544px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-1024x555.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-300x163.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-768x416.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-24x13.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM-48x26.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.31-PM.png 1174w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-signal-design">Signal Design</h3>



<p>According to the LunaNet Signal-in-Space Standard (LSIS) [3], the AFS will be broadcast at 2,492.028 MHz (2,436 times the GPS L1 C/A-code signal chipping rate), harmonized with legacy GNSS frequencies. The AFS comprises two channels:</p>



<p><strong>In-phase (I) channel:</strong>&nbsp;A 1.023 Mcps Gold-coded BPSK sequence of length 2046, carrying data for low-complexity access. Compared with GPS C/A code, it offers an acquisition gain of ~3 dB and a tracking gain of ~1 dB.</p>



<p><strong>Quadrature (Q) channel:</strong>&nbsp;A 5.115 Mcps BPSK pilot (no data) using a Weil sequence of length 10,230, optimized for high-precision tracking and applications such as lunar landing and surface navigation.</p>



<p>The navigation message uses a 250-bps data rate (5 × GPS C/A) with 1,200-bit blocks (4 × GPS C/A), providing greater flexibility for future integrity and safety-of-life services and supporting diverse lunar ephemeris representations.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="632" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-1024x632.png" alt="Screenshot 2025-08-29 at 1.22.37 PM" class="wp-image-195726" style="width:593px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-1024x632.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-300x185.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-768x474.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM-48x30.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.37-PM.png 1170w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-research-efforts-at-the-stanford-nav-lab">Research Efforts at the Stanford NAV Lab</h3>



<p>Lunar PNT is an active research area across many groups in academia, government and industry. Here, we focus on our ongoing research at the Stanford NAV Lab led by Prof. Grace Gao.</p>



<p><strong>ODTS</strong></p>



<p>NAV Lab has investigated time transfer and orbit determination algorithms for lunar navigation satellites using GNSS sidelobe signals. These signals offer a way to reduce reliance on terrestrial ground stations, but their performance is limited by (1) poor geometry (signals arriving from nearly the same direction), (2) unmodeled biases from Earth’s ionosphere and plasmasphere, and (3) large thermal noise on pseudorange measurements. To overcome these challenges, NAV Lab has pursued the following research directions:</p>



<p>•&nbsp;<strong>Feasibility study of using GNSS signals:</strong>&nbsp;Bhamidipati et al. first showed it is feasible to use GNSS signals for lunar satellite time transfer by developing a timing filter to correct clock estimates via intermittently available terrestrial-GPS signals [4]. She then performed case studies to analyze trade-offs among various grades of clocks and lunar orbits [5]. This enabled her to conceptualize the design of a SmallSat-based Lunar Navigation and Communication Satellite System (LNCSS) with GPS time-transfer that provides navigation and communication services near the lunar South Pole [6].&nbsp;</p>



<p>•&nbsp;<strong>Time-differential carrier phase (TDCP):</strong>&nbsp;TDCP measurements can cancel most slowly varying delays and provide millimeter-level range-rate accuracy. Iiyama et al. demonstrated that, by jointly processing pseudorange and TDCP with adaptive state noise compensation and a cycle slip detector, significant performance improvements were achieved [7].</p>



<p>•&nbsp;<strong>Sensor fusion with complementary measurements:&nbsp;</strong>Vila et al. investigated fusing GNSS sidelobe signals with inter-satellite ranging and optical navigation (horizon detection from onboard cameras). This diversifies measurement geometry and reduces dilution of precision [8].</p>



<p>•&nbsp;<strong>Modeling ionospheric and plasmaspheric delays:&nbsp;</strong>Iiyama et al. analyzed GNSS signal delays in lunar orbit using the Global Core Plasma Model (GCPM). Results show that main-lobe signals grazing Earth’s ionosphere (tangential altitudes below ~1,000 km) can experience delays up to 100 to 200 m, highlighting the importance of bias mitigation [9].</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="577" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-1024x577.png" alt="Screenshot 2025-08-29 at 1.22.50 PM" class="wp-image-195727" style="width:570px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-1024x577.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-300x169.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-768x433.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-24x14.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-36x20.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM-48x27.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.50-PM.png 1168w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-ephemeris-design">Ephemeris Design</h3>



<p>Ephemeris parameterization for lunar navigation satellites must strike a balance between high-accuracy orbital representation and compact message size. The latest LSIS requirements specify 40 m (95%) position accuracy and 10 mm/s (95%) velocity accuracy, with about 900 bits available for ephemeris data in each navigation frame.</p>



<p>We presented one of the earliest studies on ephemeris parameterization for lunar orbits (ELFO and LLO), proposing Chebyshev polynomial representations [10]. By tuning the polynomial degree, the trade-off between fitting accuracy and message size can be optimized. The study showed feasible representations covering more than half an ELFO orbital period exist, particularly near apoapsis, making Chebyshev polynomials a strong candidate for operational ephemeris encoding.</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="679" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-1024x679.png" alt="Screenshot 2025-08-29 at 1.22.58 PM" class="wp-image-195728" style="width:556px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-1024x679.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-300x199.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-768x509.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-24x16.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-36x24.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM-48x32.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.22.58-PM.png 1180w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-spreading-code-design">Spreading Code Design</h3>



<p>We developed efficient methods for designing families of binary spreading codes [11]. We cast code design as minimizing a convex function of the codes’ auto- and cross-correlation values, subject to constraints. We propose a bit-flip descent algorithm capable of quickly finding codes with good correlation properties. We also show the problem of optimizing over subsets of code entries while keeping others fixed can be formulated as a mixed-integer program. This approach enables block coordinate descent methods that can, in each iteration, simultaneously optimize over tens of code entries more quickly than brute force search.&nbsp;</p>



<p>We also extended this approach to account for Doppler effects by optimizing an expected objective over a continuous frequency distribution. We evaluated our methods on examples that include Lunar ELFO constellations. Our methods matched or exceeded more sophisticated baselines, including natural evolution strategies, genetic algorithms, and classical Gold/Weil codes.&nbsp;</p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" decoding="async" width="1024" height="628" src="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-1024x628.png" alt="Screenshot 2025-08-29 at 1.23.05 PM" class="wp-image-195729" style="width:602px;height:auto" srcset="https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-1024x628.png 1024w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-300x184.png 300w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-768x471.png 768w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-24x15.png 24w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-36x22.png 36w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM-48x29.png 48w, https://insidegnss.com/wp-content/uploads/2025/10/Screenshot-2025-08-29-at-1.23.05-PM.png 1174w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></figure>
</div>


<h3 class="wp-block-heading" id="h-single-satellite-doppler-based-positioning-endurance-mission">Single-Satellite Doppler-Based Positioning (Endurance Mission)</h3>



<p>For missions preceding full deployment of LANS AFS, alternative navigation strategies are required. One case is NASA’s Endurance rover, which will traverse ~2,000 km across the lunar far side. Coimbra et al. investigated rover localization by opportunistically exploiting Doppler shifts from the Lunar Pathfinder’s communication downlink, despite the spacecraft lacking a dedicated navigation payload [12]. Results showed that with Doppler-only navigation, the Endurance rover can achieve sub-10 m average positioning accuracy (when stationary) within two orbital periods of Lunar Pathfinder, providing a promising solution for early surface missions.</p>



<h3 class="wp-block-heading" id="h-clock-fault-detection-using-rigid-graphs">Clock Fault Detection Using Rigid Graphs</h3>



<p>Integrity monitoring is critical for lunar navigation systems, which must detect and exclude faulty satellites. In [13], NAV Lab designed a clock fault detection algorithm using inter-satellite ranging, independent of prior ephemeris or lunar surface monitoring (both of which may be unavailable in early deployments). The method models the constellation as a graph, where satellites are vertices and inter-satellite links are edges. A malfunctioning onboard clock’s phase jump introduces range biases that make the graph unrealizable in 3D space. By searching for redundantly rigid subgraphs (rigid even after removing any vertex) and evaluating the singular values of Euclidean distance matrices from measured ranges, faulted satellites can be isolated and excluded.</p>



<h3 class="wp-block-heading" id="h-mapping-and-path-planning-for-lunar-rovers">Mapping and Path Planning for Lunar Rovers</h3>



<p>Lunar rovers face hazardous, unstructured terrain and extreme lighting conditions that degrade perception. To advance autonomous navigation, NAV Lab participated in the NASA Lunar Autonomy Challenge managed by APL under the Lunar Surface Innovation Initiative (LSII). The challenge used a high-fidelity simulator (Unreal Engine + CARLA) with realistic rover dynamics and photorealistic lunar terrain. NAV Lab developed a full-stack autonomous agent integrating semantic perception, stereo visual odometry, pose-graph SLAM with loop closures, and hierarchical path planning [14]. The system achieved robust mapping and localization across diverse simulated conditions, culminating in a first-place finish in the final competition evaluation.</p>



<h3 class="wp-block-heading" id="h-open-source-simulator-development-lupnt">Open-Source Simulator Development (LuPNT)</h3>



<p>To support the growing lunar PNT research community, NAV Lab has developed LuPNT, a comprehensive open-source simulation framework [15]. Implemented primarily in C++ for efficiency and with Python bindings for usability, LuPNT integrates astrodynamics, communication, and PNT modules in a unified platform. Key capabilities include ODTS of lunar satellites using GNSS signals, lunar constellation and contact-plan design, inter-satellite link analysis, and surface navigation simulation via Unreal Engine. LuPNT provides a flexible, extensible toolset to accelerate algorithm development and mission design for LunaNet and future lunar PNT systems.</p>



<h3 class="wp-block-heading" id="h-summary">Summary</h3>



<p>A reliable lunar PNT system is rapidly becoming a necessity as space agencies and industry plan hundreds of missions to the Moon. NASA, ESA and JAXA are leading with early deployments of interoperable LANS providers under the LunaNet framework, standardized through the LunaNet Interoperability Specification (LNIS). These initial constellations—leveraging elliptical frozen orbits, ground stations, GNSS receivers, and new signal designs—represent the first steps toward a sustainable lunar navigation architecture.</p>



<p>At the Stanford NAV Lab, research is addressing the core technical challenges of this emerging system: orbit determination and time synchronization, ephemeris representation, autonomous fault detection, and rover navigation. Open-source simulation efforts such as LuPNT further support algorithm development and mission design. Together, these deployments and academic innovations are laying the foundation for a robust lunar PNT infrastructure to enable sustained human presence on the Moon. A future column will provide more details on several of these research efforts.&nbsp;<img decoding="async" src="blob:https://insidegnss.com/a3e2c666-a358-4950-a956-db8eaa9c6434" alt=""></p>



<h3 class="wp-block-heading" id="h-references">References </h3>



<p>[1] D. J. Israel, et al., &#8220;LunaNet: a Flexible and Extensible Lunar Exploration Communications and Navigation Infrastructure,&#8221; 2020 IEEE Aerospace Conference, Big Sky, MT, USA, 2020, pp. 1-14, doi: 10.1109/AERO47225.2020.9172509.</p>



<p>[2] LunaNet Interoperability Specification, Version 5, February 2025.&nbsp;https://www.nasa.gov/directorates/somd/space-communications-navigation-program/lunanet-interoperability-specification/</p>



<p>[3] LunaNet Signal-in-Space Recommended Standard, February 2025.&nbsp;&nbsp;https://www.nasa.gov/wp-content/uploads/2025/02/lunanet-signal-in-space-recommended-standard-augmented-forward-signal-vol-a.pdf?emrc=0f6993</p>



<p>[4] Sriramya Bhamidipati, Tara Mina and Grace Gao, Time Transfer from GPS for Designing a SmallSat-Based Lunar Navigation Satellite System, Navigation: Journal of the Institute of Navigation. September 2022, 69 (3); DOI: 10.33012/navi.535.&nbsp;</p>



<p>[5] Sriramya Bhamidipati, Tara Mina and Grace Gao, A Case Study Analysis for Designing a Lunar Navigation Satellite System with Time-Transfer from Earth-GPS, Navigation: Journal of the Institute of Navigation. December 2023, 70 (4); DOI: 10.33012/navi.599.</p>



<p>[6] Sriramya Bhamidipati, Tara Mina, Alana Sanchez, and Grace Gao, Satellite Constellation Design for a Lunar Navigation and Communication System, Navigation: Journal of the Institute of Navigation. December 2023, 70 (4); DOI: 10.33012/navi.613.</p>



<p>[7] K. Iiyama, S. Bhamidipati, and G. Gao, Precise Positioning and Timekeeping in Lunar Orbit via Terrestrial GPS Time-Differenced Carrier-Phase Measurements, Navigation: Journal of the Institute of Navigation. March 2024, 71(1); DOI: 10.33012/navi.635.</p>



<p>[8] G. C. Vila and G. Gao, Sensor Fusion for Autonomous Orbit Determination and Time Synchronization in Lunar Orbit, IEEE Aerospace Conference, Big Sky, MT, March 2025</p>



<p>[9] K. Iiyama and G. Gao, Plasmaspheric Delay Characterization and Comparison of Mitigation Methodologies for Lunar Terrestrial GNSS Receivers, Proceedings of the Institute of Navigation GNSS+ conference (ION GNSS+ 2025).</p>



<p>[10] M. Cortinovis, K. Iiyama, and G. Gao, Satellite Ephemeris Parameterization Methods to Support Lunar Positioning, Navigation, and Timing Services, Navigation: Journal of the Institute of Navigation. December 2024, 71 (4) ; DOI: 10.33012/navi.664.&nbsp;</p>



<p>[11] A. Yang, T. Mina, and G. Gao, Spreading Code Sequence Design via Mixed-Integer Convex Optimization, Navigation: Journal of the Institute of Navigation. September 2025, 72 (3); DOI: 10.33012/navi.706.</p>



<p>[12] K.&nbsp;&nbsp;M. Y. Coimbra, M. Cortinovis, T. Mina, and G. Gao, Single-Satellite Lunar Navigation via Doppler Shift Observables for the NASA Endurance Mission, Navigation: Journal of the Institute of Navigation. September 2025, 72 (3); DOI: 10.33012/navi.710.</p>



<p>[13] K. Iiyama, Daniel Neamati, and Grace Gao, Autonomous Constellation Fault Monitoring with Inter-satellite Links: A Rigidity-Based Approach, Proceedings of the Institute of Navigation GNSS+ conference (ION GNSS+ 2024), Baltimore, MD, Sep 2024.</p>



<p>[14]&nbsp;&nbsp;A. Dai, A. Wu, K. Iiyama, G. C. Vila, K. M. Y. Coimbra, A. Carlhammar, B. Wu, and G. Gao, Full Stack Navigation, Mapping, and Planning for the Lunar Autonomy Challenge, Proceedings of the Institute of Navigation GNSS+ conference (ION GNSS+ 2025), Baltimore, MD, Sep 2025.</p>



<p>[15] G. C. Vila*, K. Iiyama*, and G. Gao, LuPNT: An Open-Source Simulator for Lunar Communications, Positioning, Navigation, and Timing, IEEE Aerospace Conference, Big Sky, MT, March 2025.</p>



<h3 class="wp-block-heading" id="h-authors">Authors</h3>



<p><strong>Keidai Iiyama</strong>&nbsp;is a Ph.D. candidate in the Department of Aeronautics and Astronautics at Stanford University advised by Prof. Grace Gao. He received his M.E. degree in Aerospace Engineering in 2021 from the University of Tokyo, where he also received his B.E. in 2019. His research is on positioning, navigation and timing of lunar space- craft and rovers, and system designs for lunar navigation systems.&nbsp;</p>



<p><strong>Grace Gao</strong>&nbsp;is an associate professor in the Department of Aeronautics and Astronautics at Stanford University, leading the Navigation and Autonomous Vehicles Laboratory (NAV Lab). Her research is on robust and secure positioning, navigation and timing with applications to manned and unmanned aerial vehicles, autonomous driving cars, as well as space robotics.</p>
<p>The post <a href="https://insidegnss.com/can-satellite-based-radionavigation-be-extended-to-the-moon-and-other-extraterrestrial-bodies/">Can Satellite-based Radionavigation be Extended to the Moon and Other Extraterrestrial Bodies?</a> appeared first on <a href="https://insidegnss.com">Inside GNSS - Global Navigation Satellite Systems Engineering, Policy, and Design</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
