Signal-based satellite spoofing jamming detection method and components
A technology of deception detection and deception interference, which is applied in the field of signal interference, can solve the problems of high hardware design requirements and difficult implementation, and achieve the effects of high recognition rate, improved detection rate, and guaranteed accuracy and detection rate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0032] Such as figure 1 Shown, the signal-based satellite spoofing interference detection method, the method performs the following steps:
[0033] Step 1: Obtain the signal frequency shift value of each tracking channel of the signal receiving device during the vertical reciprocating motion;
[0034] Step 2: Multi-space mapping is performed on the signal frequency shift value to obtain the mapping value in each space, and based on the obtained mapping value, a multi-space mapping collection is established for each space;
[0035] Step 3: For each space, calculate the frequency shift variation amplitude component between the mapping value of one of the spaces under multi-space mapping and the mapping value of the adjacent space in the corresponding space. After calculating the amplitude component of the shift change, count the number of spatial mapping values whose frequency shift amplitude component is higher than the set threshold, and this number is used as the relative ...
Embodiment 2
[0039] On the basis of the previous embodiment, the deception detection result is obtained based on the signal frequency shift variation amplitude of each tracking channel and the pitch angle difference of each tracking channel corresponding to the satellite, which specifically includes: if the If the signal frequency shift variation amplitude of each tracking channel is proportional to the pitch angle difference of the corresponding satellite of each tracking channel, then the spoofing detection result is a real signal; otherwise, the spoofing detection result is a spoofing signal.
[0040] Specifically, due to some congenital factors of the satellite navigation system itself, there are some insurmountable weaknesses. For example, satellite navigation signals are very weak and are susceptible to intentional and unintentional interference; secondly, satellite navigation is completely dependent on the reception of satellite radio signals, and when satellites are poorly distribut...
Embodiment 3
[0042] The method according to claim 2, wherein in said step 3, for each space, the mapping value of one of the spaces under the multi-space mapping and the mapping value of the adjacent space in the corresponding space are calculated The method of changing the magnitude components between the frequency shifts includes: the spatial total number is denoted as , through the following formula, calculate the amplitude component of the frequency shift change:
[0043] ;in, is the spatial superscript value, is the total number of spaces, N is the total number of mapped values, Represents the membership degree matrix under the Gth space, Indicates the frequency shift center in the Gth space, Indicates the frequency shift mapping value in the Gth space, Indicates the center point of the i-th category under the G-th space, d is the space number of the mapped value, Indicates the jth mapping value under the Gth space, Indicates the membership degree of the j-th mapping...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


