SBAS Ionospheric Threat — Empirical Evidence

Scope status

This note translates GNSS-RO empirical findings over Indonesia into SBAS ionospheric integrity language. It is a bridge note between ionospheric science and SBAS system design, not a design specification.

Boundary:

Threat categories from Indonesian GNSS-RO data

Threat 1: Large absolute delay tails

StatisticTECUL1 equivalent (m)
Median46.97.6
p95166.026.9
p99341.155.4
Maximum observed468.476.1

SBAS interpretation: The observed upper-tail delays are important threat-discovery signals for low-latitude SBAS research. This page does not compare them with any specific operational SBAS assumption unless a directly extracted service-design source is added.

Threat 2: Spatial gradients

StatisticEquivalent L1 gradient (mm/km)
Median6.6
p9546.7
p9981.9
Maximum208.3

SBAS interpretation: Large-gradient observations are threat-discovery signals for differential-correction and integrity analysis. Any comparison with an operational service must be sourced from that service’s own design, performance, or validation evidence.

Threat 3: Undersampled risk windows

Risk windowProfiles available
Post-sunset 18–21 LT0
Storm/disturbed class (V3)23 (possibly coincidental sampling)

SBAS interpretation: An integrity threat model built only on available data would systematically underestimate post-sunset risk. This is not a finding of low risk — it is a finding of insufficient data. Operational SBAS certification requires deliberate acquisition of these windows.

Threat 4: Model underestimate bias

MetricValue
IRI-2020 systematic bias66.72 TECU (10.8 m L1)
RMSE94.34 TECU (15.3 m L1)

SBAS interpretation: If an SBAS ionospheric model performs similarly to IRI-2020 in this region, broadcast corrections would systematically understate actual delay. This inflates the residual error budget and can compromise integrity if the GIVE does not overbound the true model error.

Threat-budget scaffold (pre-operational)

The V3 paper introduced a pre-operational SBAS threat-budget separation:

ComponentSourceCurrent trust level
Observed delay-tail proxyGNSS-ROModerate (sparse temporal sampling)
Leave-day-out temporal-transfer residualRobust modelModerate (R² = 0.44)
Spatial-gradient allowancePairwise RO proxyLow (not IPP-domain)
Post-sunset coverage penaltyMissing dataMust be explicitly penalized
Storm-time extrapolation penaltyLimited storm samplesMust be explicitly penalized

Key boundary: Convert this scaffold into candidate GIVE-like quantization only after post-sunset and storm gaps are closed with additional data and ground GNSS/scintillation validation.

Relationship to the vault

Parent domain

Sibling domain

Upstream notes

What this note does NOT claim

  • That GNSS-RO can directly compute operational SBAS GIVE values
  • That the sampled days provide sufficient coverage for certification
  • That Indonesia is “worse” than other equatorial regions (no comparative data)
  • That the threat budget is ready for operational use

Source-routing boundary

Use this note only as empirical threat-discovery evidence. Do not use it as:

  • an operational SBAS ionospheric correction model;
  • an approved GIVE or grid-definition source;
  • a service-volume or availability source;
  • a procedure-approval source;
  • a replacement for ground-monitoring, service-design, or regulator evidence.

Routing path:

Empirical ionosphere evidence
  -> threat discovery / research prioritization
  -> service-design validation question
  -> operational validation only after official service/regulator evidence
  1. Do not import another region’s ionospheric assumptions without source support for Indonesia or ASEAN.
  2. Stratify threat assessment by IGRF dip-latitude region, local-time window, and space-weather state.
  3. Combine RO with ground GNSS/scintillation before attempting service-design validation; RO alone is insufficient.
  4. Deliberately acquire post-sunset and storm data before deriving operational candidate bins.
  5. Use RO as threat-discovery evidence and ground/service/regulator sources for operational validation.

See also