REVIEW article
Front. Phys.
Sec. Space Physics
Volume 13 - 2025 | doi: 10.3389/fphy.2025.1567301
This article is part of the Research TopicFrontiers in Multi-Source Positioning, Navigation and Timing (PNT)View all 10 articles
A Survey of GNSS Receiver Autonomous Integrity Monitoring: Research Status and Opportunities
Provisionally accepted- 1College of Electronic Science and Technology, National University of Defense Technology, Changsha, China
- 2National Key Laboratory for Positioning, Navigation and Timing Technology, Changsha, China
- 3Chongqing Academy of Metrology and Quality Inspection, Chongqing, China
Select one of your emails
You have multiple emails registered with Frontiers:
Notify me on publication
Please enter your email address:
If you already have an account, please login
You don't have a Frontiers account ? You can register here
Integrity monitoring is crucial in applications closely related to the safety of human life and property, such as aviation, maritime navigation, autonomous driving, and rail transportation. Receiver autonomous integrity monitoring (RAIM) has attracted significant attention due to its comprehensive monitoring coverage and fast alerting capability. The paper provides a comprehensive review of RAIM algorithms for global navigation satellite system (GNSS) positioning applications. The parameters related to integrity assessment and typical fault detection and exclusion methods are reviewed, and RAIM is categorized into three types of methods: error probability distribution modelbased, set representation-based, and machine learning-based. The latest state-of-the-art research, along with the strengths and shortcomings of each type of method, is presented for each type. The opportunities for the future development of RAIM are analyzed in the light of current challenges and existing results, aiming to promote further research and provide effective assurance for GNSS integrity.
Keywords: Global Navigation Satellite System, Integrity, Receiver autonomous integrity monitoring, Fault detection and exclusion, Protection level
Received: 27 Jan 2025; Accepted: 02 Jun 2025.
Copyright: © 2025 Zhen, Weihua, Rui, Pengpeng, Zhicheng and Gang. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
* Correspondence: Mou Weihua, College of Electronic Science and Technology, National University of Defense Technology, Changsha, China
Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.