Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
© GMV, 2015 GMV Property
All rights reserved
IBPL AND KIPLALGORITHMSDEVELOPED BY GMV.REMAINING ISSUES
Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
VILLENEUVE D’ASCQ, DECEMBER 15th 2015
© GMV, 2015
CONTENTS
1) Introduction on Integrity for Terrestrial Users
2) Different Approaches for Integrity
3) Major requirements
4) The IBPL Algorithm
5) The KIPL Algorithm
6) Performances
7) Remaining issues
15/12/15 Page 2Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 201515/12/15 Page 3Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
DO TERRESTRIAL USERS REQUIREINTEGRITY?Position integrity concept mainly linked to safety criticalapplications and, in particular aviation.
As a matter of fact GNSS integrity has been formalized andprogressed thanks to the Civil Aviation domain.
Is the concept applicable for terrestrial users? By analogy it should be applicable for safety critical terrestrial
applications (Autonomous Driving, Automatic Driver AssistanceSystems –ADAS- in vehicles…)
It is believed to be also of application for the so called “liability critical”applications (other authors call it “financial grade” applications).
Note that this question seems to have an obvious answer today but thishas not been the case in the last 10 years. Change has been providedthanks to different initiatives where IFSTTAR, and very in particular Mr.Peyret, has had a key role.
15/12/15 Page 4Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
AUTONOMOUS DRIVING: THE MOSTDEMANDING INTEGRITY APPLICATION
15/12/15 Page 5Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
Today notonly GNSSindustry butalsoautomotivestakeholderssuch asRenault orBosch believethat integrityis key forautonomousdriving
© GMV, 201515/12/15 Page 6Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
RECALL ON INTEGRITY
Integrity basically means bounding different errors sources with avery high probability (or eliminating those errors that can beabove a giving bound –threshold-).
Protection levels are, as a matter of fact, “no more” than abounding of position errors with that high probability.
If we want to provide position integrity we have to bound thedifferent error sources.
15/12/15 Page 7Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
IDENTIFICATION OF GNSS ERRORS
GNSS errors can be classified in: System Errors. E.g.:
– Orbits– Time synchronization
Propagation errors. E.g.:– Iono– Tropo
Local Errors. E.g.:– Jamming / Interferences– Multipath
Receiver Errors. E.g.:– Tracking errors– Thermal noise
15/12/15 Page 8Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
HOW THEY ARE BOUNDED BY SBAS/GBAS
SBAS GBAS
System Errors:Orbits
Time synchronizationPropagation errors:
IonoTropo
Local Errors:Interferences neglected
Multipath (LoS and NLoS)Receiver Errors
15/12/15 Page 9Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
EstimatedSeparately:(UDRE+ GIVE)
Bounded bya-priorivalues
EstimatedGlobally
Boundedby a-priorivalues
© GMV, 2015
APPLICATION TO TERRESTRIAL USERS
Are those boundings for local errors assumed for civil aviationvalid for terrestrial users? No: those boundings are too optimistic for terrestrial users.
Are there other valid bounds? No that serve in a practical manner for the process:
– Too large for some errors to provide valid values …– and what is more critical other (larger) errors in particular NLoS Multipath
cannot be reasonably bounded (errors of hundreds of meters are probable)
GBAS and SBAS cannot provide integrity for terrestrial users.Classical RAIM either.
For Civil Aviation the main threats for integrity are system andpropagation errors. For terrestrial users the local errors are themost important threat
15/12/15 Page 10Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
NEED OF DIFFERENT APPROACHES FORINTEGRITYAs seen SBAS and GBAS: not valid.
Classical RAIM (single/dual failure assumption) implementationneither
Need to develop specific algorithms.
Approach to implement RAIM-like (autonomous) type algorithms
Help of GNSS augmentations to provide integrity not useful:Augmentations “are not aware” of the local errors suffered by theuser
However, use of SBAS or GBAS as a source to improve accuracymay help to improve performances of autonomous integrityalgorithms
15/12/15 Page 11Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
CHALLENGES
Nature of errors: Multiple “faults” (large errors due to multipath)is very probable.
Complexity of FDE: being those “faults” very frequent the balancebetween miss-detection and false detection is specially complex.
Validity for all environments from open sky to deep urban: notpossible to make assumptions on the type of environment.
Need to minimize PLs sizes in a context of large measurementerrors.
Lack of continuous signals due to obstacles.
Phase measurement availability substantially reduced (quite lessthan pseudoranges).
Large DOPs due to limited sky visibility.
15/12/15 Page 12Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 201515/12/15 Page 13Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
Two different approaches: Measurement Rejection Approach (MRA):
“Faulty” measurements must be identified and rejected; “faulty”meaning “with significant errors”, not necessarily due to satellitefailures (e.g. large NLoSM). Classical RAIM not working asmultiple “faulty” measurements appear.
Error Characterization Approach (ECA):Measurement errors must be characterized, but measurementsare not divided in groups of “good” and “bad”. Protection levelsmust account for measurement errors (even large ones) andtheir effect in position errors.
DIFFERENT APPROACHES FOR INTEGRITY(I)
© GMV, 201515/12/15 Page 14Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
GMV has focused the R&D in the ECA approach.
Two steps:
1) Initial algorithm for snapshot solution: IBPL
2) Generalization to Kalman filtered solution also allowing simplerintegration of other sensors: KIPL
In parallel, Civil Aviation is mainly focused today in A-RAIMtechniques
DIFFERENT APPROACHES FOR INTEGRITY(II)
© GMV, 201515/12/15 Page 15Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
BASIC REQUIREMENTS
Reference values 10-4 or10-6 for liability criticaland 10-5 or 10-7 forsafety critical
No clear reference valuesestablished
15/12/15 Page 16Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
HOW GOOD INTEGRITY ALOGORITHM IS?
Algorithm is valid as far as it fulfills the requirements: IR < TIR: a must Small PL sizes
But no magic: PLs according to accuracy. Small PLs cannot beachieved without high accuracy
Efficiency of PLs computation (not directly PL sizes) is a betterassessment of the goodness of the algorithm
Small PLs are then achieved with: “Efficient” PLs Highly accurate measurements/positioning (not depending on
the algorithms but on the quality/capabilities of sensors)
Balance of safety (IR<TIR) and efficiency is the challenge
Safety Index: Error/Protection Level. The smaller safety thehighest safety margin
15/12/15 Page 17Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
ALGORITHMS EFFICIENCY: SAFETY INDEXPERSPECTIVE
15/12/15 Page 18Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
IBPL less conservativethan EGNOS while fulfillingthat IR<TIR!
© GMV, 2015
Kal
man
-bas
ed H
PL
(met
ers)
Horizontal Position Error (meters)
GNSS+IMU 1E-4 - Urban Canyon
log 10
of t
he n
umbe
r of p
oint
s pe
r dot
MIEpochs: 0
0
Normal Operation1
0.345% of 99634 epochs out of plot limits
0 20 40 60 80 1000
10
20
30
40
50
60
70
80
90
100
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
ALGORITHMS EFFICIENCY: STANFORDDIAGRAM PESPECTIVE
15/12/15 Page 19Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
The “magic”PL
ReasonableReference.Slope accordingto TIR
ConservativePL
© GMV, 201515/12/15 Page 20Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 201515/12/15 Page 21Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
ISOTROPY-BASED PROTECTION LEVEL (I)
Isotropy assumption: the vector of measurement errors (ε) can point inany direction of the N-dimensional measurement space with the sameprobability (spherical distribution).
ε can be projected in a 4-dimensional “plane” (vector δ)linked through the observationmatrix H to the 4 dimensionsspace-time “plane” and theresiduals (vector ρ) in the N-4dimension
If we select the size of the twopolar caps as 1-α (α being theintegrity risk), the probability thatthe vector points outisde de capsis α
Becuase of the isotropyassumption the probability thatthe vector points in a givensurface is equal to the size of thisarea in relation to the spheresurface.
© GMV, 201515/12/15 Page 22Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
ISOTROPY-BASED PROTECTION LEVEL (II)
If we transform now to the spacedimension (through the H matrix)we can ensure that Δ (positionerror) is within PR with the sameprobability
Thus, given a residual ρ, the probability that δ is larger than B (i.e. εpointing out of the caps) is bounded by this probability α.
© GMV, 201515/12/15 Page 23Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
ISOTROPY-BASED PROTECTION LEVEL (III)
In practice, we compute the limitratio K as a function of α and N,then scale it with the size of theresidual vector ρ. Finally, the pull-back through H is represented bythe DOP factor.
PL = K(N,α) x ║ρ║ x DOP
© GMV, 201515/12/15 Page 24Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
ISOTROPY-BASED PROTECTION LEVEL (IV)
The Isotropy-Based Protection Level: Only relies on the isotropy assumption (that has been largely
demonstrated with experimental data); no assumptions are requiredon:
a) individual measurement errors’ distributionb) probability of multiple failures
Is adaptive to different environments: zones with small or null NLoSmultipath has associated small residuals and, hence, small ProtectionLevels:
It can be computed for any required TIR (specially relevant to adapt todifferent integrity requirements)
Easy and powerful exploitation of multiple constellations (e.g. GPS +Galileo). Because K largely decreases with the number ofmeasurements, important PL size reduction is achieved in multi-constellation scenarios
© GMV, 201515/12/15 Page 25Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
KIPL ALGORITHM (I)
IBPL method for integrity of least-squares navigationBased on simple statistical assumption: isotropy of measurement
errorsHighly reliable in all kind of environments
But Kalman filter preferred because:Higher accuracySimpler integration of other sensors
Target: Improved Accuracy + Decrease size of ProtectionLevels (for any given TIR) w.r.t. the IBPL
New integrity method extends ideas from IBPL to the Kalman-filtered navigation solutions (KIPL)
Implemented solution based on multiconstellation receiver andlow cost IMUs (but KIPL can cope with other differenttechnologies)
15/12/15 Page 26Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
KERNEL
Statisticalcharacterizationof input errorsbased on IBPL
Statisticalcharacterizationof input errorsbased on IBPL
Statisticalcharacterizationof output errors
Statisticalcharacterizationof output errors
PL computationPL computation
KIPL
CODE
DOPPLER
Others
KALMANFILTER PVT
KIPL ALGORITHM(II)
15/12/15 Page27Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 201515/12/15 Page 28Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
KIPL RESULTING PERFORMANCES (I)
15/12/15 Page 29Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
Content
Cumulated Horizontal Position Errors
95%: ~12m75%: ~ 7m50%: ~ 4m
Cumulated HPLUrban Canyon
Based on metrics defined by prEN16.803. Urban Canyon Scenario
ACCURACY INTEGRITY: HPL SIZE
95%: ~ 47m75%: ~ 37m50%: ~ 30m
Cumulated HPLOpen Sky
95%: ~ 32m75%: ~ 25m50%: ~ 20m
© GMV, 2015
KIPL RESULTING PERFORMANCES (II)
15/12/15 Page 30Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
TargetIntegrity
Risk
IR ofGNSS-
only [m]
IR ofGNSS+IM
U [m]1E-2 1.8E-3 1.5E-31E-3 3.4E-4 1.5E-41E-4 6.1E-5 01E-5 6.1E-6 01E-6 0 0
INTEGRITY: Measured IR < TIR
Measured IR always < TIR
Kal
man
-bas
ed H
PL
(met
ers)
Horizontal Position Error (meters)
GNSS+IMU 1E-4 - Urban Canyon
log 10
of t
he n
umbe
r of p
oint
s pe
r dot
MIEpochs: 0
0
Normal Operation1
0.345% of 99634 epochs out of plot limits
0 20 40 60 80 1000
10
20
30
40
50
60
70
80
90
100
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
© GMV, 201515/12/15 Page 31Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
1) Introduction on Integrity for Terrestrial Users2) Different Approaches for Integrity3) Major requirements4) The IBPL Algorithm5) The KIPL Algorithm6) Performances7) Remaining issues
© GMV, 2015
REMAINING ISSUES (I)
IBPL and KIPL are considered a solid basis for providing positionintegrity for road applications both for liability critical and safetycritical applications
Performances of KIPL has been demonstrated to be according tothe needs of many liability critical applications
Requirements for safety critical applications in particular forAutonomous Driving are still not mature. It is important tounderstand that different levels of autonomous driving may havevery different requirements
15/12/15 Page 32Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
REMAINING ISSUES(II)
Major effort in KIPL to provide improved performances accordingto those needs
TIR should not be a major concern because IBPL/KIPL can beadapted to different TIRs (input parameter)
However testing of TIR < 10-6 is a challenge
Major challenge is the provision of small PLs. Key is the use oftechnologies with high accuracy. Three main lines of investigation: Highly accurate GNSS-only solutions: RTK and PPP. Improvements in vehicle sensors performances (IMUs +
odometers) allowing improvements on hybridized solutions Integration with other sensors and maps
15/12/15 Page 33Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
REMAINING ISSUES (III)
Continuity requirements (not separated from availability in liabilitycritical application) may be needed for safety critical applicationsand, therefore, this performance needs to be investigated for IBPLand KIPL algorithms
Safety critical applications require not only absolute position butalso relative position among vehicles. Integrity of relative positionwill be a new requirement
Analysis of KIPL use for relative position and its resultingperformance is another line of investigation for the future
15/12/15 Page 34Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015
CONCLUSIONS
Position integrity for road applications (liability and safety criticalapplications) is today assumed as a key performance. It was notthe case only one or two years ago!
Autonomous integrity is needed to cope with local errors
Two algorithms have been developed and largely tested by GMV:IBPL and KIPL
They are operational and able to cope with different applicationrequirements and different technologies. TIR is an inputparameter
Still challenges to provide integrity for safety critical applicationswhere very small PLs are a must. Continuity requirements will bealso needed
Remaining issues (as for many R&D initiatives) is almostunbounded!
15/12/15 Page 35Workshop on INTEGRITY MONITORING FORTERRESTRIAL USERS
© GMV, 2015 GMV Property
All rights reserved
Thank you!Joaquín Cosmen-SchortmannCEO AdvisorE-mail: [email protected]