CN110161537B - Method for detecting Beidou deception jamming based on relative distance of receiver - Google Patents

Method for detecting Beidou deception jamming based on relative distance of receiver Download PDF

Info

Publication number
CN110161537B
CN110161537B CN201910088248.0A CN201910088248A CN110161537B CN 110161537 B CN110161537 B CN 110161537B CN 201910088248 A CN201910088248 A CN 201910088248A CN 110161537 B CN110161537 B CN 110161537B
Authority
CN
China
Prior art keywords
receiver
deception
beidou
relative distance
deception jamming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910088248.0A
Other languages
Chinese (zh)
Other versions
CN110161537A (en
Inventor
车浩军
吴志强
杨才明
陈建平
金乃正
金军
朱玛
陶涛
李勇
张琦
李康毅
崔泓
周剑峰
谢永海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaoxing Jianyuan Electric Power Group Co ltd
Zhejiang Shuangcheng Electrical Co ltd
Hangzhou Dianzi University
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Shaoxing Jianyuan Electric Power Group Co ltd
Zhejiang Shuangcheng Electrical Co ltd
Hangzhou Dianzi University
Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaoxing Jianyuan Electric Power Group Co ltd, Zhejiang Shuangcheng Electrical Co ltd, Hangzhou Dianzi University, Shaoxing Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Shaoxing Jianyuan Electric Power Group Co ltd
Priority to CN201910088248.0A priority Critical patent/CN110161537B/en
Publication of CN110161537A publication Critical patent/CN110161537A/en
Application granted granted Critical
Publication of CN110161537B publication Critical patent/CN110161537B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service
    • G01S19/215Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service issues related to spoofing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Position Fixing By Use Of Radio Waves (AREA)

Abstract

The invention provides a method for detecting Beidou deception jamming based on relative distance of a receiver, which comprises the steps that the receiver respectively receives a real Beidou signal and a pseudo Beidou signal under different relative distances, and experimental data are collected; establishing a model to calculate the relative positioning distance between the two receiving modules; calculating a deviation value of the relative distance of the positioning position of the distributed receiver and the average value under the condition of not being disturbed by deception according to the experimental data; and (4) accumulating errors by using a CUSUM algorithm, and judging the deception jamming. By adopting the common GPS/BD antenna as the deception jamming detection antenna, the cost of deception jamming detection is reduced. The relative distance based on positioning between the receiving modules is used as a judgment condition, and the stability is high. By adopting the CUSUM algorithm, when the continuous error accumulation exceeds the threshold value, the receiver is judged to be subjected to the deception interference, and the misjudgment condition caused by unstable deception interference is reduced.

Description

Method for detecting Beidou deception jamming based on relative distance of receiver
Technical Field
The invention belongs to the field of communication, relates to detection of Beidou deception signals, and particularly provides a method for detecting Beidou deception interference by a distributed receiver. Beidou deception jamming detection method based on distributed receiver
Background
At present, the positioning accuracy of the Beidou navigation system in the Asia-Pacific region is better than 10 meters, the speed measurement accuracy is better than 0.2 m/s, and the time service accuracy is better than 50 nanoseconds. The one-way time service precision and the two-way time service index of the Beidou system are superior to those of the similar foreign systems. In the future, the Beidou navigation system is used for positioning and time service in the fields of traffic, agriculture, forestry, fishery, electric power, finance and the like. However, the civil Beidou receiver is easily subjected to deception interference, so that the Beidou receiver can calculate pseudo-geographic positions and pseudo-local time, and the equipment depending on Beidou time service navigation is damaged.
At present, some methods are proposed in the literature related to the detection of the satellite spoofing interference. There are related documents that propose methods for detecting spoofing interference based on the direction angle of the received signal and the degree of dispersion of the signal-to-noise ratio of the received signal, but these methods have high requirements for the receiving antenna. It is proposed theoretically in the literature that the relative distance between the distributed receivers is 0, which is smaller than the actual physical location of the receivers, and the spoofing interference can be detected based on the relative distance between the distributed receivers. However, this document does not actually simulate the relative distance between outdoor distributed receivers that are subject to spoofing interference, nor does it suggest a specific decision formula for detecting spoofing interference.
Disclosure of Invention
In order to solve the problem of detecting the Beidou deception jamming, the invention discovers that the relative distance between distributed receivers is not 0 as a theoretical value under the deception jamming through experiments, and provides a method for rapidly detecting the deception jamming according to a CUSUM algorithm.
The technical scheme adopted by the invention is a method for detecting Beidou deception jamming based on the relative distance of a receiver, and the method comprises the following steps:
step 1, respectively receiving a real Beidou signal and a pseudo Beidou signal by a receiver under different relative distances, and acquiring experimental data;
step 2, establishing a model to calculate the relative distance between the two receiving modules;
step 3, calculating a deviation value of the relative distance and the average value of the positioning position of the distributed receiver under the condition of not being disturbed by deception according to the experimental data;
and 4, utilizing a CUSUM algorithm to accumulate errors and judging the deception jamming.
Optionally, the modeling calculates a relative distance between two positioning modules, including:
the earth is regarded as an ideal sphere, and the Haversene model keeps 0.5% of precision when estimating the distance between two near points;
longitude and latitude position respectively solved by two receivers
Figure BDA0001962467290000021
Substituting into the formula (1),
Figure BDA0001962467290000022
/>
obtaining a relative position d between the longitude and the latitude, wherein in the formula (1), r is the radius of the earth;
and obtaining the estimated distances of the positioning positions of the different distance receiving modules under the two conditions of not being subjected to deception jamming and being subjected to deception jamming.
Optionally, the using the CUSUM algorithm to perform error accumulation, and the determining the spoofing interference includes:
establishing an error judgment function;
and establishing an error accumulation function by using a CUSUM algorithm.
Optionally, the establishing an error determination function includes:
because the receiver locates the relative distance d' i when not being interfered by deception]The method is stable, and the deviation can not exceed 2m. And when the receiver receives the spoofing interference, d [ i ]]And
Figure BDA0001962467290000031
the deviation of (a) is relatively large. In formula (4), k is a comparison value, and is set to 4;
Figure BDA0001962467290000032
in the case of deceptive jamming, the error function value l [ i ] is positive; in the case of no spoofing, the error function value i is negative.
Optionally, the establishing an error accumulation function by using a CUSUM algorithm includes:
CUSUM is used to detect data points where an anomaly has begun to occur in a relatively stable data sequence. According to the formula (5), the error accumulation sum function m (t) starts accumulation from the moment when the error judgment function l [ i ] has a positive value;
Figure BDA0001962467290000033
setting a threshold value tau, judging that the receiver is subjected to deception interference when the error accumulation function m (t) is more than or equal to tau, and solving an iterative relation of m (t) by a formula (6) for conveniently realizing programming;
Figure BDA0001962467290000034
the invention has the beneficial effects that:
the invention adopts the common GPS/BD antenna as the deception jamming detection antenna, thereby reducing the cost of deception jamming detection. The relative distance of positioning between the receiving modules is used as a judgment condition, so that the stability is high. By adopting the CUSUM algorithm, when the continuous error accumulation exceeds the threshold value, the receiver is judged to be subjected to the deception interference, and the misjudgment condition caused by unstable deception interference is reduced.
Drawings
Fig. 1 is a Beidou analog signal emission diagram.
FIG. 2 is a big dipper signal simulator SMBV satellite signal setting interface.
Fig. 3 is an experimental picture of true distributed receiving of the beidou signal.
Fig. 4-6 show the relative distances at which the receiving modules are positioned, both spoofed and unscrupulous, when the receiving modules are at a distance of 10m,20m, 40m.
Fig. 7-9 illustrate deviations of relative distances from the average distance of the receiving modules when they are spaced apart 10m,20m,40m without spoofing interference.
FIG. 10 shows the detection effect of the CUSUM algorithm in the case of spoofing interference when the receiving modules are at distances of 10m,20m and 40m.
Detailed Description
The receiver chip of the experiment was a common ATGM332D-5N chip on the market, and the receiving antenna was a common GPS/BD antenna. The big dipper signal simulator of this experiment is SMBV100A, and it can simulate 12 different big dipper signals at most.
The technical scheme adopted by the invention comprises the following steps:
1, receiving Beidou signals at different positions by a receiving antenna under the conditions of no interference and interference respectively, and solving a positioning position;
2, establishing an earth model to calculate the relative distance of the receiver positioning;
calculating an average value of relative distances of the positioning positions of the distributed receiver and a deviation value of the relative distances of the positioning positions of the distributed receiver and the average value under the condition of not being disturbed by deception according to experimental data;
and 4, calculating the average deviation value of the relative position of the receiver positioning and the actual relative position of the receiver. And (4) utilizing a CUSUM algorithm to accumulate errors, and if the error accumulation value is larger than a threshold value, indicating that the receiver is subjected to deception jamming.
Step 1, the receiver respectively receives a real Beidou signal and a pseudo Beidou signal under different relative distances, and experimental data are collected.
In an open outdoor zone, two pairs of Beidou signal receiving modules are used for receiving Beidou signals. And under the condition that the Beidou signal simulator is closed, the NMEA (National Electron Association) data calculated by the receiving module is transmitted to the computer. And then, extracting the positioning longitude and latitude resolved by the Beidou chip from the NMEA data. The real physical relative position between the receiving modules is changed, and the position positioning of the two Beidou signal receiving modules under different physical relative positions can be extracted by the same method. Experiment in the case where the physical relative positions of the receiving modules are 10m,20m and 40m, the receiver is kept receiving data for about 5 minutes, and their positioning positions are extracted from the 5 minutes NMEA data as experimental analysis data, respectively.
And 2, establishing a model to calculate the relative positioning distance of the two receiving modules.
The invention only calculates the distance difference between two points, and does not need to have high requirement on precision. Therefore, the earth can be considered as an ideal sphere. When the Haversene model estimates the distance between two near points, the accuracy of 0.5 percent can be kept, and the requirement of the invention is met.
Longitude and latitude position respectively solved by two receivers
Figure BDA0001962467290000061
Substituted into formula (1)>
Figure BDA0001962467290000062
The relative position d between two longitudes and latitudes can be obtained, and in the formula (1), r is the earth radius and can be regarded as 6378.137km.
And analyzing the experimental data to obtain the estimated distances of the positioning positions of the receiving modules at different distances within 5 minutes under the two conditions of no deception interference and deception interference. See fig. 4-6. The following conclusions can be drawn:
1) The actual physical position between two receivers can be estimated more accurately by using the Haverine model, for example, when the relative distance between the receiving modules is 10m,20m and 40m, the estimated position of the Haverine model is about 12m,19m and 39m.
2) And when the receiving module receives the real Beidou signal for positioning, the relative positioning position between the two receivers is stable.
3) In the case of deception jamming, the relative positions of the receiving modules are smaller than the actual positions and do not exceed 10m.
4) In the case of fraudulent interference, the relative positions of the receiving modules may be unstable. For example, at a distance of 15m, the receivers suddenly increase their relative positioning positions at a moment, and then immediately return to the normal relative positioning positions.
And 3, calculating the deviation value of the relative distance and the average value of the positioning position of the distributed receiver under the condition of not being interfered by deception according to the experimental data.
Under the condition that the receivers are not subjected to deception interference, the positioning result is stable, and the relative distance between the distributed receivers is also stable. The deviation d' i of the relative distance d i of the receiver location from the average value at different time instants can be found according to equations (2) and (3).
Figure BDA0001962467290000071
Figure BDA0001962467290000072
The probability distribution of d' i is determined as shown in FIGS. 7-9. It can be seen from the figure that when the receivers are spaced at 10m,20m and 40m, their positioning relative distance is stable without fraudulent interference, and the deviation from the average distance value is not more than 2m.
And 4, utilizing a CUSUM algorithm to accumulate errors and judging the deception jamming.
4-1, establishing an error judgment function l [ i ].
Because the receiver locates the relative distance d' i when not being interfered by deception]The method is stable, and the deviation can not exceed 2m. And when the receiver receives the spoofing interference, d [ i ]]And
Figure BDA0001962467290000073
the deviation of (a) is relatively large. In equation (4), k is a comparison value and can be set to 4.
Figure BDA0001962467290000074
In the case of deceptive jamming, the error function value l [ i ] is positive; in the case of no spoofing, the error function value i is negative.
4-2, establishing an error accumulation function m (t) by utilizing a CUSUM algorithm.
CUSUM is used to detect data points in a relatively stable data sequence where an anomaly has begun to occur. According to equation (5), the error accumulation sum function m (t) is accumulated from the moment when the error determination function i [ i ] takes a positive value.
Figure BDA0001962467290000081
And setting a threshold value tau, and judging that the receiver is subjected to deception interference when the error accumulation function m (t) is more than or equal to tau. For the convenience of programming, equation (6) solves the iterative relationship of m (t).
Figure BDA0001962467290000082
As shown in the figures 1 and 2, the pseudo time of the Beidou satellite simulator for transmitting the Beidou satellite signals and the pseudo position calculated by the pseudo range are set. After the setting is finished, a radio frequency switch of the Beidou satellite simulator is turned on, and the pseudo Beidou satellite signal starts to be transmitted.
As shown in fig. 3, the relative distance between two big dipper receivers is controlled to be 10m,20m and 40m, and then the receiver positioning relative distance under the two conditions of deception interference and un-deception interference is calculated by using a Haversine model respectively to obtain fig. 4-6.
Fig. 7-9 are graphs of probability of deviation degree of positioning relative distance obtained at different distances under the condition that the receiving module is not interfered by cheating. It can be seen from the figure that the relative positioning distance of the receiving module is stable without spoofing interference, and the deviation from the positioning average value is not more than 2m. This lays a good foundation for detecting spoof interference later by using the deviation of the relative distance of the positioning from the average value of the positioning under the undisturbed condition.
FIG. 10 is a diagram of the simulation effect of the CUSUM algorithm on the accumulation of positioning errors. The simulation data is data received at a distance of 10m,20m and 40m in both cases of deception and non-deception interference by a receiver. And ensuring that two receivers receive deception jamming without switching at the same time, and performing data processing by using a CUSUM algorithm to obtain the result of the graph 10. In fig. 10, it can be seen that as the distance increases, the slope of m (t) also increases. Setting the threshold τ =50, spoofing interference can be detected in a short time when the physical distance of the receiver is 40 m.
It should be understood by those skilled in the art that the above embodiments are only for illustrating the present invention and are not to be taken as limiting the present invention, and the changes and modifications of the above embodiments are within the scope of the present invention.

Claims (5)

1. A method for detecting Beidou deception jamming based on relative distance of a receiver is characterized by comprising the following steps:
step 1, respectively receiving a real Beidou signal and a pseudo Beidou signal by a receiver under different relative distances, and acquiring experimental data;
step 2, establishing a model to calculate the relative positioning distance of the two receiving modules;
step 3, calculating a deviation value of the relative distance and the average value of the positioning position of the distributed receiver under the condition of not being disturbed by deception according to the experimental data;
and 4, utilizing a CUSUM algorithm to accumulate errors and judging the deception jamming.
2. The method for detecting Beidou deception jamming based on receiver relative distance according to claim 1, wherein the modeling calculates the relative distance between two receiving module locations, comprising:
the earth is regarded as an ideal sphere, and the Haversene model keeps 0.5% of precision when estimating the distance between two near points;
longitude and latitude position respectively solved by two receivers
Figure FDA0003940442880000011
Substituting into the formula (1),
Figure FDA0003940442880000012
obtaining a relative position d between the longitude and the latitude, wherein in the formula (1), r is the radius of the earth;
and obtaining the estimated distances of the positioning positions of the different distance receiving modules under the two conditions of not being subjected to deception jamming and being subjected to deception jamming.
3. The method for detecting Beidou deception jamming based on receiver relative distance according to claim 1, wherein the error accumulation is performed by using CUSUM algorithm, and the determining deception jamming comprises:
establishing an error judgment function;
and establishing an error accumulation function by using a CUSUM algorithm.
4. The method for detecting Beidou deception jamming based on receiver relative distance according to claim 3, wherein the establishing an error judgment function comprises:
because the receiver locates the relative distance d' i when not being interfered by deception]Is stable, the deviation will not exceed 2m, and when the receiver receives the deception jamming, d [ i]And
Figure FDA0003940442880000021
is large, in formula (4), k is a comparison value, and is set to be 4;
Figure FDA0003940442880000022
in the case of deceptive jamming, the error function value l [ i ] is positive; in the case of no spoofing, the error function value i is negative.
5. The method for detecting Beidou deception jamming based on receiver relative distance according to claim 1, wherein the establishing an error accumulation function by using CUSUM algorithm comprises:
CUSUM is used for detecting data points which start to generate abnormity in a certain relatively stable data sequence, and accumulating the error accumulation sum function m (t) from the moment when the error judgment function l [ i ] generates positive values according to a formula (5);
Figure FDA0003940442880000023
setting a threshold value tau, judging that the receiver is subjected to deception interference when the error accumulation function m (t) is more than or equal to tau, and solving an iterative relation of m (t) by a formula (6) for conveniently realizing programming;
Figure FDA0003940442880000024
Figure FDA0003940442880000031
CN201910088248.0A 2019-01-29 2019-01-29 Method for detecting Beidou deception jamming based on relative distance of receiver Active CN110161537B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910088248.0A CN110161537B (en) 2019-01-29 2019-01-29 Method for detecting Beidou deception jamming based on relative distance of receiver

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910088248.0A CN110161537B (en) 2019-01-29 2019-01-29 Method for detecting Beidou deception jamming based on relative distance of receiver

Publications (2)

Publication Number Publication Date
CN110161537A CN110161537A (en) 2019-08-23
CN110161537B true CN110161537B (en) 2023-03-24

Family

ID=67645303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910088248.0A Active CN110161537B (en) 2019-01-29 2019-01-29 Method for detecting Beidou deception jamming based on relative distance of receiver

Country Status (1)

Country Link
CN (1) CN110161537B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111007539B (en) * 2019-10-29 2022-09-30 长沙海格北斗信息技术有限公司 Beidou frequency band interference analysis method and dynamic adjustment method thereof
CN110708396B (en) * 2019-11-07 2022-02-18 中国民航大学 ADS-B text authenticity detection method based on reverse positioning technology
CN110749905B (en) * 2019-11-25 2021-11-30 清华大学 Single-satellite low-complexity satellite navigation deception signal detection and identification method and device
CN112649675A (en) * 2020-12-17 2021-04-13 深圳供电局有限公司 PLC (programmable logic controller) anomaly detection method based on electromagnetic side channel

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106093978A (en) * 2016-06-30 2016-11-09 郑州威科姆科技股份有限公司 A kind of anti-spoofing formula interference signal processing method of GNSS time service type DVB
CN107621645A (en) * 2017-09-05 2018-01-23 中国人民解放军国防科技大学 Deception jamming signal detection method based on single receiver

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8922427B2 (en) * 2011-06-29 2014-12-30 Bae Systems Information And Electronic Systems Integration Inc. Methods and systems for detecting GPS spoofing attacks

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106093978A (en) * 2016-06-30 2016-11-09 郑州威科姆科技股份有限公司 A kind of anti-spoofing formula interference signal processing method of GNSS time service type DVB
CN107621645A (en) * 2017-09-05 2018-01-23 中国人民解放军国防科技大学 Deception jamming signal detection method based on single receiver

Also Published As

Publication number Publication date
CN110161537A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
CN110161537B (en) Method for detecting Beidou deception jamming based on relative distance of receiver
CN108828628B (en) Deception signal detection method
CN107505635B (en) Method for detecting satellite positioning spoofing attack
CN109343088B (en) Distributed Beidou deception jamming detection method based on signal to noise ratio
CN110879404A (en) GNSS deception jamming detection method based on combination of correlation peak and residual signal
CN109059916A (en) A kind of aerostatics occultation forecasting procedure based on inertial navigation
CN111983655B (en) Method and device for determining urban canyon area, electronic equipment and storage medium
CN112083446B (en) Method and device for positioning deception jamming source
CN109521412B (en) Radar networking airspace target detection method based on local statistic fusion
CN110178049B (en) Multipath management in global navigation satellite system
CN115598669A (en) Navigation multi-feature GNSS deception jamming detection method, system, equipment and medium
CN114065803A (en) Training method, identification method and device of interference signal identification model
CN112511976B (en) Processing method, device, equipment and medium for positioning control end of unmanned aerial vehicle
CN110649957A (en) Method, system and medium for reducing transmission error rate of slip ring of satellite-borne microwave radiometer
CA2698921C (en) Method and device for estimating the integrity risk in a satellite navigation system
CN110749905B (en) Single-satellite low-complexity satellite navigation deception signal detection and identification method and device
CN113238253B (en) Satellite navigation positioning spoofing signal defending method and device based on base station assistance
KR102459708B1 (en) Apparatus for determining spoofing from signal of global-navigation-satellite-system and method using the same
CN112964938B (en) Lightning single-station positioning method, device and system based on artificial intelligence
Wen et al. A flexible GNSS spoofer localization system: Spoofing discrimination and localization method
CN113960640A (en) Detection method and device of deception signal
CN104297557A (en) United navigation autonomous integrity monitoring method applicable to free flight of plurality of aircraft
Lv et al. Research on Shadow Matching Algorithm Based on Consistency Probability Weighting
Chang et al. An Anti-spoofing Model based on MVM and MCCM for a Loosely-coupled GNSS/INS/LiDAR Kalman Filter
CN105388497A (en) Satellite navigation spoofing attack and defense method and system based on clustering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant