Satellite spoofing jamming identification method and device based on constellation trajectory
A technology of spoofing interference and identification methods, which is applied in the direction of measuring devices, satellite radio beacon positioning systems, instruments, etc., can solve the problems of high power consumption, easy detection, and the receiver does not know the threat of spoofing, so as to improve the recognition rate Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The present invention will be further described below in conjunction with the accompanying drawings.
[0029] Such as figure 1 As shown, a satellite spoofing interference identification method based on the constellation trajectory disclosed in the embodiment of the present invention, the method establishes a constellation diagram based on the acquired data code sequence of each satellite before the judgment, and extracts the spatial radio frequency fingerprint feature through the constellation diagram to identify spoofing For satellite interference, at first use any satellite data code as the I-way data, and use other satellite data codes as the Q-way data to establish a constellation diagram respectively; then divide the constellation diagram into several regions of the same size according to the coordinate axis range of the constellation diagram, Count the number of points in each area to get the density of the constellation points; finally, cluster the dense areas, a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


