Unlock instant, AI-driven research and patent intelligence for your innovation.

Satellite spoofing jamming identification method and device based on constellation trajectory

A technology of spoofing interference and identification methods, which is applied in the direction of measuring devices, satellite radio beacon positioning systems, instruments, etc., can solve the problems of high power consumption, easy detection, and the receiver does not know the threat of spoofing, so as to improve the recognition rate Effect

Active Publication Date: 2020-07-31
SOUTHEAST UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The difference between these two types of jamming is that suppressing jamming is a simple and easy-to-use method, but the jamming process consumes a lot of power and is easy to be detected; however, the mechanisms of deceptive jamming and suppressing jamming are completely different, and low power guarantees its Concealment and strong camouflage survivability
Therefore, in the actual operating environment, since the receiver does not know the existence of the threat of spoofing, the harm caused by spoofing jamming is more serious than suppressing jamming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Satellite spoofing jamming identification method and device based on constellation trajectory
  • Satellite spoofing jamming identification method and device based on constellation trajectory
  • Satellite spoofing jamming identification method and device based on constellation trajectory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings.

[0029] Such as figure 1 As shown, a satellite spoofing interference identification method based on the constellation trajectory disclosed in the embodiment of the present invention, the method establishes a constellation diagram based on the acquired data code sequence of each satellite before the judgment, and extracts the spatial radio frequency fingerprint feature through the constellation diagram to identify spoofing For satellite interference, at first use any satellite data code as the I-way data, and use other satellite data codes as the Q-way data to establish a constellation diagram respectively; then divide the constellation diagram into several regions of the same size according to the coordinate axis range of the constellation diagram, Count the number of points in each area to get the density of the constellation points; finally, cluster the dense areas, a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a satellite deception jamming recognition method and satellite deception jamming recognition device based on a constellation trajectory. The method establishes constellation diagrams based on the obtained pre-decision data code sequences of each satellite, and extracts satellite spatial distribution features through the constellation diagrams to recognize deceptive satelliteinterference, comprising the following steps: using a data code of any satellite as I channel data and data codes of other satellites as Q channel data to respectively establish constellation diagrams; dividing the constellation diagrams into several regions of the same size according to the coordinate axis ranges of the constellation diagrams, counting the number of points in each region to obtain the intensity of the constellation points; clustering the regions marked as dense, and determining whether are deceptive satellite signals according to the Euclidean distance between the cluster centers at different time periods. The method provided by the invention can be used separately or in combination with the existing satellite deception target recognition method to improve the recognition rate.

Description

technical field [0001] The invention relates to a satellite spoofing interference identification method and device based on constellation trajectory, belonging to the field of satellite communication and information security. Background technique [0002] The global satellite navigation system can provide users with all-day, all-weather coordinate, speed and time information services in the global ground and near-earth space. While the satellite navigation system plays an important role in human production and life, its safety has attracted more and more attention. The interference against satellite navigation system seriously threatens all walks of life related to satellite navigation. Among the many threat interference methods, deceptive interference is highly concealed and harmful. Compared with other interference such as suppression, it is especially vulnerable to attackers. favor. [0003] At present, the jamming against the satellite navigation system is mainly divid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G01S19/21
CPCG01S19/21
Inventor 姜禹胡爱群彭林宁
Owner SOUTHEAST UNIV