CN113805200B - Anti-spoofing authentication method for satellite navigation signals - Google Patents

Anti-spoofing authentication method for satellite navigation signals Download PDF

Info

Publication number
CN113805200B
CN113805200B CN202111051208.2A CN202111051208A CN113805200B CN 113805200 B CN113805200 B CN 113805200B CN 202111051208 A CN202111051208 A CN 202111051208A CN 113805200 B CN113805200 B CN 113805200B
Authority
CN
China
Prior art keywords
interference
signal
power
area
hypothesis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111051208.2A
Other languages
Chinese (zh)
Other versions
CN113805200A (en
Inventor
谢坚
王梦凡
张兆林
邓均午
王伶
韩闯
宫延云
陶明亮
粟嘉
范一飞
杨欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northwestern Polytechnical University
Original Assignee
Northwestern Polytechnical University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northwestern Polytechnical University filed Critical Northwestern Polytechnical University
Priority to CN202111051208.2A priority Critical patent/CN113805200B/en
Publication of CN113805200A publication Critical patent/CN113805200A/en
Application granted granted Critical
Publication of CN113805200B publication Critical patent/CN113805200B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/13Receivers
    • G01S19/21Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service
    • G01S19/215Interference related issues ; Issues related to cross-correlation, spoofing or other methods of denial of service issues related to spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Noise Elimination (AREA)

Abstract

The invention provides an anti-deception authentication method for satellite navigation signals, which combines a power monitoring technology with early-late gate measurement, simultaneously monitors received power and related function distortion under a Bayesian detection framework, and realizes effective detection of deception jamming. Under the Bayesian framework of hypothesis test, the invention obtains the optimal decision region by utilizing Monte Carlo experiments through four classifications, obtains the judged region by comparing the power value and early-late gate metric value of the received signal with each region, and obtains the detection reliability of various classifications by counting the judged region. Compared with the prior art, the method can greatly improve the detection reliability of different interferences.

Description

Anti-spoofing authentication method for satellite navigation signals
Technical Field
The invention relates to the field of global satellite navigation, in particular to a satellite signal authentication method, and in particular relates to the problem of interference detection of global satellite navigation signals.
Background
The satellite signal itself has weak signal strength when reaching the ground after being propagated in the atmosphere, and is more severely interfered in a complex electromagnetic environment. Therefore, detection of interference is particularly urgent. The disclosures of GNSS signals result in their susceptibility to counterfeiting. The receiver becomes the victim of a rogue attack in which a fake GNSS signal spoofs the receiver to report a misleading location or time.
Currently, receiver-autonomous, low-cost GNSS signal authentication techniques that do not require changing GNSS signal space are favored. But if operated alone for a certain characteristic, the detection performance is very unreliable, and in the application of the navigation system, a false alarm is often generated. And the existing combination of power and symmetry difference measures, for example, is insensitive to detection and unreliable in detection of deception jamming performance because only single-channel information is utilized; the combination of early-late gate metrics and ratio metrics is not effective in detecting high power fraud because no power metric value is introduced. Thus, the challenges of GNSS authentication techniques are also exposed, mainly in detecting whether spoofing is reliable.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides an anti-spoofing authentication method for satellite navigation signals. In order to better solve the problem of deception jamming detection reliability, the invention provides an anti-deception authentication method for satellite navigation signals, which creatively combines a power monitoring technology with early-late gate measurement, thereby greatly reducing false alarm probability.
The invention combines the received power and early-late gate measurement, and simultaneously monitors the received power and related function distortion under the Bayesian detection framework, thereby realizing the effective detection of deception jamming. The invention has good detection performance and greatly improves the reliability of deception jamming detection.
The technical scheme adopted by the invention for solving the technical problems comprises the following steps:
step one: with the down-converted signals, under the condition of no related interference term, for the down-converted real GNSS signals S A (t), the following complex baseband model is adopted:
Where P A is the received power of the real signal in watts, D (t) is the navigation data with a value of ±1, t is the time in seconds, τ A is the code offset in seconds, C A (t) is the pseudorandom spreading code with a value of ±1, exp (j θ A) is the carrier with a phase of θ A, the navigation data D (t) can be ignored without loss of generality, let D (t) =1, and the interference signal S J (t) is modeled as:
Where η=p J/PA is the power advantage of the interfering signal over the real signal, i.e. the ratio of the interfering power P J to the real signal power P A; τ J and θ J are the code offset and carrier phase of the interfering signal, respectively; the received noise S N (t) is modeled as:
SN(t)=N(t)+M(t) (3)
The noise is the sum of thermal noise N (t) with constant spectral density N 0 and multiple access interference M (t) with variable spectral density M 0, and the complete received signal S (t) is modeled as follows:
S(t)=SA(t)+SJ(t)+SN(t) (4)
Wherein S A (t) is a true GNSS signal, S J (t) is an interfering signal, S N (t) is noise, and the scaling factor β (t) of the automatic gain control circuit is multiplied by S (t), so that the power of the scaled signal β (t) S (t) remains constant;
step two: the local code l (t, τ) is modeled as follows:
Where τ is any code phase delay in seconds, C l (t) is the local code, equal to C A (t); And/> Is an estimate of the code phase and carrier phase of the composite signal S (t);
And (3) correlating the beta (t) S (t) with the local code l (t, tau) to obtain two paths of data of I path I (tau) and Q path Q (tau), wherein the two paths of data are as follows:
Wherein Δτ A is τ A and And the difference of delta tau J、ΔθJ and delta theta A,/>, are obtained by the same methodAnd/>Two paths of Gaussian white noise are I, Q respectively; r (·) is a spreading code autocorrelation function, expressed as:
Where T c is the spreading code single chip time period;
Step three: a bayesian multi-hypothesis testing framework is adopted to distinguish hypotheses, wherein each hypothesis type is H i, I epsilon I, i= {0,1,2,3}, zero hypothesis H 0 corresponds to a non-interference condition, and H i, i=1, 2,3 respectively corresponds to multipath interference, deception interference and suppression interference;
The three relevant parameters, namely interference power dominance eta, interference and true signal spreading code offset delta tau = tau JA and carrier phase offset delta theta = theta JA, are selected, combined into a vector theta = [ eta, delta tau, delta theta ], and the vector theta is assumed to lie in a parameter space lambda which itself is divided into disjoint parameter sets And each parameter set is associated with its corresponding hypothesis H i; thus, determining θ∈Λi is equivalent to selecting hypothesis H i;
In the Bayesian formula of the composite hypothesis test problem, the vector θ is regarded as a random number, the probability density is w (θ), where pi i is the prior probability that θ falls into Λ i, and the conditional probability density for a given θ ε Λi, θ is expressed by w i (θ):
There are two types of observations, namely, observed received power P and early-late gate metric m ELP, which are associated with four hypotheses; combining the two observations into a vector z= [ m ELP,P]T, wherein the observation set of the vector z is Γ, and the conditional probability density distribution is p (z|theta);
The decision criterion δ (z) is used to divide Γ into disjoint decision regions Γ i such that when z e Γ i corresponds to the H i hypothesis, i.e., Γ i corresponds to H i;
let C [ i, θ ] be the cost function when H i is selected when θ∈Λ is the actual parameter vector, the cost function is closely related to the selection of θ, and the average cost of conditional risk is defined as:
Where E θ represents the derivation of the expectation, the Bayesian risk r (δ) is defined as:
Finding the optimal decision criterion delta (z) minimizes the Bayesian risk r (delta), i.e. finding the optimal decision region Γ i, I e I;
Step four: modeling the reception of M S +1 real signals, each with an interference signal associated with it, the received signal S C (t) is as follows:
Wherein S Ai (t) is the i-th real signal, its associated interference is S Ji (t), and N (t) is noise;
the observed power value P (dBW) is:
Wherein T is integration accumulated time, and T 1 is time at any selected moment; the conditional probability density function of P meets the average value of Variance is/>In which,/>
Wherein Δθ i and Δτ i correspond to carrier phase offset and code phase offset between the ith interference and the corresponding real signal, respectively, P Ai is the power value of the ith real signal, η i is the ratio of the ith interference to the power of the ith real signal, W P is the bandwidth of the power to be measured, N 0 is the thermal noise spectral density, and σ P is up to 0.5dB within the bandwidth of 2 MHZ;
for multiple access interference M (T), the density of multiple access interference is M 0, expressed as:
wherein M S is the number of real signals minus one, In relation to P A, but in different cases with different values, where i=0 denotes the real signal and its interference, i=1,..m s denotes the multiple access signal and its interference;
for the early-late gate metric value m ELP:
where τ d is the observation point position set for two data paths I (τ) and Q (τ), and tan -1 is the inverse tangent.
Combining the observed power value with the early-late gate metric value to obtain z= [ m ELP,P]T, wherein m ELP and P are mutually independent;
Step five: acquiring a corresponding optimal decision area by utilizing a Monte Carlo experiment;
(1) For each I e I, the N i parameter vector is modeled according to the w i (θ) distribution, where N i/Np≈πi, The first simulation vector extracted from w i (θ) is denoted θ li;
(2) For each θ li, generate an N M analog measurement; the mth simulation for a given θ li measures z mli, the total amount of samples generated by the simulation is N PNM;
(3) Dividing the two-dimensional observation space gamma into a large number of small rectangular units with uniform size; assuming that each cell belongs to a single decision region, so that all observation samples falling in the cells belonging to Γ i are equivalently allocated to hypothesis H i, I epsilon I, each cell is allocated to hypothesis H i with the largest number of samples Γ in the cell, an initial partition of z mli is created, the boundary is adjusted, each cell is guaranteed to belong to only one type, namely a certain type of sample point in the cell is the largest, all the cells are set to belong to the type, and each decision region Γ i is in single communication;
(4) Adjusting the boundary area, and considering the allocation of a new decision area; as long as the resulting decision area remains single connected, the new assignment remains unchanged as long as the bayesian risk r (δ) is reduced; repeatedly changing the area of the boundary area, changing the area into the currently set area if the Bayesian risk is reduced, and keeping the original area until no boundary unit needs to be reassigned, wherein the unit assignment forms a final judgment area gamma i at the moment, I epsilon I if the Bayesian risk is not reduced;
the bayesian risk r (δ) at this time is expressed as:
wherein the cost function C [ i, θ ] is defined as follows:
Writing the cost function to C ij,Cij represents the cost of selecting H i when H j is true; when i=j, cost C ij =0, otherwise, cost C ij =1; however, in a practical scenario, not all misclassifications will have the same cost, and the cost is set as follows:
Through the discussion of the previous parameters, modeling to generate sample points, carrying out small block division on the whole area, and obtaining an initial area by visual observation of the sample points; and then constantly replacing the assignment of the boundary region to minimize the Bayesian risk and obtain a final decision region, namely an optimal decision region.
After the optimal region is obtained, the sample point can be regenerated, the region to which the sample point belongs is known, and the determination is carried out in the optimal decision region by utilizing the power value and early-late gate metric value of the sample point, so as to re-determine which region the sample point belongs to; and a large number of samples are generated for experiments, and the probability obtained by comparing the determined belonging area with the original area is counted, so that the larger the probability is, the better the performance is.
In the third step, in order to find δ (z) of the optimal decision criterion, each parameter set Λi, I e I and condition distribution w i (θ), I e I;
(1) H 0 is free from interference;
In the absence of interference, the parameter set is defined as:
Λ0={θ∈Λ∣η=0} (12)
The three marginal distributions of w 1 (x) are: w η0 (x) is a dirac delta function, w τ0 (x) and w θ0 (x) are arbitrarily defined;
(2) H 1 multipath;
in multipath situations, the parameter set is defined as:
Λ1={θ∈Λ∣0<η<1,0<Δτ<Tc} (13)
the three marginal distributions of w 2 (x) are: w η1 (x) is logarithmic distribution with a mean value of-21 dB and a standard deviation of 5dB, w Δτ1(x)=μ-1e-x/μ, x is more than or equal to 0, wherein mu is related to satellite pitch angle, and w θ1 (x) is uniformly distributed on [0,2 pi);
(3) H 2 deception jamming
In case of spoofing interference, the parameter set is defined as:
Λ2={θ∈Λ∣1≤η,0<|Δτ|<Tc} (14)
The three marginal distributions of w 2 (x) are: w η2 (x) is a logarithmic distribution with a mean of 1dB and a standard deviation of 1dB, w Δτ2 (x) is an exponential distribution with a parameter μ=120, w θ2 (x) is uniformly distributed over [0,2 pi);
(4) H 3 suppression type interference
In case of interference at compacting, the parameter set is defined as:
Λ3={θ∈Λ∣1≤η,|Δτ|≥Tc} (15)
the three marginal distributions of w 3 (x) are: w η3 (x) is a dirac delta function, w τ3 (x) and w θ3 (x) are arbitrarily defined.
In the fourth step, the specific cases are as follows:
(1) In the case of no interference or only one multipath signal or only one spoofing interference, i.e., P Ai=PA,i=0,...,Ms and η i=0,i=1,...,Ms; at this time, the liquid crystal display device,
(2) In the case of a jammer, i.e., each of the M s +1 received signals is modeled as having a power P A, and each signal is affected by an incoherent interference signal having a power ηp A, at this point,
(3) In the case of spoofing, i.e. spoofing not only for real signals, but also for multiple access signals, at this point,
The invention has the beneficial effects that the received power and early-late gate measurement are innovatively combined, and under the Bayesian framework of hypothesis test, the optimal decision area is obtained by utilizing Monte Carlo experiments through four classifications. The decided areas can be obtained by comparing the power value and early-late gate metric value of the received signal with the respective areas. And obtaining the detection reliability of various classifications through statistics of the judged areas. Compared with the prior art, the method can greatly improve the detection reliability of different interferences.
Drawings
FIG. 1 is a sample graph produced by the present invention.
FIG. 2 is a graph of the optimal decision region produced by the present invention.
Detailed Description
The invention will be further described with reference to the drawings and examples.
Embodiments of the invention are as follows:
Step one:
The present invention uses down-converted signals. In the case of no fraud, for the down-converted real GNSS signal, the signal power is set to P A = -156dBW, and the code offset τ A of the real signal is set to 0, the carrier phase θ A is set to 0, and D (t) = 1, resulting in the complex baseband model S A (t) as follows:
where t is time in seconds and C A (t) is a pseudorandom spreading code having a value of + -1, then the interfering signal S J (t) can be modeled as:
Where η is the power dominance of the interfering signal over the real signal, τ J and θ J are the code and carrier phases of the interfering signal, respectively, and the received noise is modeled as:
SN(t)=N(t)+M(t) (25)
The noise is the sum of thermal noise N (t) with constant spectral density thermal noise spectral density N 0 = -204dBW/Hz and multiple access interference M (t) with variable spectral density M0. The complete received signal S (t) model is as follows:
S(t)=SA(t)+SJ(t)+SN(t) (26)
Wherein S A (t) is a true GNSS signal, S J (t) is an interference signal, and S N (t) is noise. The scaling factor β (t) of the automatic gain control circuit is applied to S (t) such that the power in the scaled signal β (t) S (t) remains constant.
Step two:
The local code l (t, τ) is modeled as follows:
Where τ is any code phase delay in seconds, C l (t) is the local code, typically equal to C A (t). And/>Is an estimated value of the code phase and carrier phase of the composite signal S (t), and is set in step one, therefore/>And/>Is a value close to 0.
And (3) correlating the beta (t) S (t) with the local code l (t, tau) to obtain two paths of data of I path I (tau) and Q path Q (tau), wherein the two paths of data are as follows:
Wherein Δτ J is τ J and Delta theta J is theta J and/>Is a difference in (c). /(I)And/>And respectively is I, Q paths of Gaussian white noise. /(I)Is a spreading code autocorrelation function, expressed as:
Where T c is the single chip time period of the spreading code, set to 10A -6 s.
Step three: a bayesian multiple hypothesis testing framework is employed to distinguish hypotheses, where H i, I e I, i= {0,1,2,3}. Null hypothesis H 0 corresponds to the no interference case and H i, i=1, 2,3 correspond to multipath, spoofing, and squelch interference, respectively.
The signal model reveals three parameters related to the choice between hypotheses, namely the interference power dominance η, and the interference versus true signal spreading code offset and carrier phase offset Δτ=τ JA=τJ and Δθ=θ JA=θJ. Combining three parameters into a single vector θ= [ η, Δτ, Δθ ] is assumed to lie in a parameter space Λ, which itself is divided into disjoint parameter setsI e I, and each parameter set is associated with its corresponding hypothesis H i. Thus, determining θ∈Λi is equivalent to selecting hypothesis H i.
In the Bayesian formulation of the composite hypothesis testing problem, the parameter vector θ is considered as a random number θ. Its probability density w (θ) sets a priori probabilities of pi 0=0.6,π1=0.2,π2=0.05,π3 =0.15, respectively.
The observation received power P and the early-late gate metric m ELP are combined into a vector z= [ m ELP,P]T, the observation set of the vector z is Γ, and the conditional probability density distribution is P (z|θ).
There is then a decision criterion δ (z) for dividing Γ into disjoint decision regions Γ i such that when z e Γ i corresponds to the H i hypothesis, i.e. Γ i corresponds to H i.
Let C [ i, θ ] be the cost function when H i is selected when θ∈Λ is the actual parameter vector, set to:
To find delta (z) of the optimal decision criteria, each parameter set Λi, I e I and the condition distribution w i (θ), I e I is defined as equations (12), (13), (14), (15).
Step four: a received signal model for M S = 7 is built as follows:
Wherein S Ai (t) is the i-th real signal, its associated interference is S Ji (t), and N (t) is noise.
The integration time at the power calculation is set to 0.1s, and the observed power value P (dBW) is:
Wherein t 1 is the selected arbitrary time. Setting the conditional probability density mean square error sigma P =0.4dB of P, wherein the conditional probability density function of P meets the average value as Variance is/>In which,/>And the bandwidth W P of the power to be measured is set to 2MHz.
Wherein Δθ i and Δτ i correspond to the carrier phase offset and the code phase offset, respectively, between the ith interference and the corresponding real signal.
For multiple access interference M (T), its density is M 0, expressed as:
For H 0 and H 1: H2:/>H3:/>
If the reference observation point τ d is set to 0.5T c, the early-late gate metric value m ELP is:
wherein tan -1 represents the inverse tangent.
Step five: and obtaining a corresponding optimal decision area by using a Monte Carlo experiment.
Setting N P to 100000 and N M to 20, 200000 sample points were generated by Monte Carlo experiments. As shown in fig. 1, a range area 1"+" indicates a non-interfering signal sample point, a range area 3"O" indicates a multi-path signal sample point, a range area 4"×" indicates a spoofed interfering signal sample point, and a range area 1"Δ" indicates a suppressed interfering signal sample point.
The initial decision region is approximately acquired by the sample points of fig. 1. And optimizing the region boundary by using the following formula to obtain an optimal region.
Wherein, N i, I ε I is obtained by prior probability and N M.
The optimal decision area is obtained through simulation as shown in fig. 2, wherein the '①' area represents a non-interference decision area, the '②' area represents a multipath interference decision area, the '③' area represents a spoofing interference decision area, and the '④' area represents a suppression interference decision area.
The effect of the invention can be further illustrated by a simulated evaluation of the optimal region. The simulation results are shown in table 1:
Wherein table 1 is a classification matrix table generated using the optimal decision region of the present invention. The horizontal direction represents the region to which the real sample belongs, and the vertical direction represents the decided region. Consistent across and across indicates that the decision is correct, e.g., 89.34% of the probability that a point of spoofing is past the decision region is determined to be spoofing. The degree of reliability of detection of each kind of interference can be seen from the data shown in the figure.

Claims (3)

1. The anti-spoofing authentication method for the satellite navigation signal is characterized by comprising the following steps of:
step one: with the down-converted signals, under the condition of no related interference term, for the down-converted real GNSS signals S A (t), the following complex baseband model is adopted:
Where P A is the received power of the real signal in watts, D (t) is the navigation data with a value of ±1, t is the time in seconds, τ A is the code offset in seconds, C A (t) is the pseudorandom spreading code with a value of ±1, exp (j θ A) is the carrier with a phase of θ A, the navigation data D (t) can be ignored without loss of generality, let D (t) =1, and the interference signal S J (t) is modeled as:
Where η=p J/PA is the power advantage of the interfering signal over the real signal, i.e. the ratio of the interfering power P J to the real signal power P A; τ J and θ J are the code offset and carrier phase of the interfering signal, respectively; the received noise S N (t) is modeled as:
SN(t)=N(t)+M(t) (3)
The noise is the sum of thermal noise N (t) with constant spectral density N 0 and multiple access interference M (t) with variable spectral density M 0, and the complete received signal S (t) is modeled as follows:
S(t)=SA(t)+SJ(t)+SN(t) (4)
Wherein S A (t) is a true GNSS signal, S J (t) is an interfering signal, S N (t) is noise, and the scaling factor β (t) of the automatic gain control circuit is multiplied by S (t), so that the power of the scaled signal β (t) S (t) remains constant;
step two: the local code l (t, τ) is modeled as follows:
Where τ is any code phase delay in seconds, C l (t) is the local code, equal to C A (t); And/> Is an estimate of the code phase and carrier phase of the composite signal S (t);
And (3) correlating the beta (t) S (t) with the local code l (t, tau) to obtain two paths of data of I path I (tau) and Q path Q (tau), wherein the two paths of data are as follows:
Wherein Δτ A is τ A and And the difference of delta tau J、ΔθJ and delta theta A,/>, are obtained by the same methodAnd/>Two paths of Gaussian white noise are I, Q respectively; r (·) is a spreading code autocorrelation function, expressed as:
Where T c is the spreading code single chip time period;
Step three: a bayesian multi-hypothesis testing framework is adopted to distinguish hypotheses, wherein each hypothesis type is H i, I epsilon I, i= {0,1,2,3}, zero hypothesis H 0 corresponds to a non-interference condition, and H i, i=1, 2,3 respectively corresponds to multipath interference, deception interference and suppression interference;
The three relevant parameters, namely interference power dominance eta, interference and true signal spreading code offset delta tau = tau JA and carrier phase offset delta theta = theta JA, are selected, combined into a vector theta = [ eta, delta tau, delta theta ], and the vector theta is assumed to lie in a parameter space lambda which itself is divided into disjoint parameter sets I e I, and each parameter set is associated with its corresponding hypothesis H i; thus, determining θ∈Λi is equivalent to selecting hypothesis H i;
In the Bayesian formula of the composite hypothesis test problem, the vector θ is regarded as a random number, the probability density is w (θ), where pi i is the prior probability that θ falls into Λ i, and the conditional probability density for a given θ ε Λi, θ is expressed by w i (θ):
There are two types of observations, namely, observed received power P and early-late gate metric m ELP, which are associated with four hypotheses; combining the two observations into a vector z= [ m ELP,P]T, wherein the observation set of the vector z is Γ, and the conditional probability density distribution is p (z|theta);
The decision criterion δ (z) is used to divide Γ into disjoint decision regions Γ i such that when z e Γ i corresponds to the H i hypothesis, i.e., Γ i corresponds to H i;
let C [ i, θ ] be the cost function when H i is selected when θ∈Λ is the actual parameter vector, the cost function is closely related to the selection of θ, and the average cost of conditional risk is defined as:
Where E θ represents the derivation of the expectation, the Bayesian risk r (δ) is defined as:
Finding the optimal decision criterion delta (z) minimizes the Bayesian risk r (delta), i.e. finding the optimal decision region Γ i, I e I;
Step four: modeling the reception of M S +1 real signals, each with an interference signal associated with it, the received signal S C (t) is as follows:
Wherein S Ai (t) is the i-th real signal, its associated interference is S Ji (t), and N (t) is noise;
the observed power value P (dBW) is:
Wherein T is integration accumulated time, and T 1 is time at any selected moment; the conditional probability density function of P meets the average value of Variance is/>In which,/>
Wherein Δθ i and Δτ i correspond to carrier phase offset and code phase offset between the ith interference and the corresponding real signal, respectively, P Ai is the power value of the ith real signal, η i is the ratio of the ith interference to the power of the ith real signal, W P is the bandwidth of the power to be measured, N 0 is the thermal noise spectral density, and σ P is up to 0.5dB within the bandwidth of 2 MHZ;
for multiple access interference M (T), the density of multiple access interference is M 0, expressed as:
wherein M S is the number of real signals minus one, In relation to P A, but in different cases with different values, where i=0 denotes the real signal and its interference, i=1,..m s denotes the multiple access signal and its interference;
for the early-late gate metric value m ELP:
Wherein τ d is the observation point position set on the two paths of data of the I path I (τ) and the Q path Q (τ), and tan -1 represents the inverse tangent;
Combining the observed power value with the early-late gate metric value to obtain z= [ m ELP,P]T, wherein m ELP and P are mutually independent;
Step five: acquiring a corresponding optimal decision area by utilizing a Monte Carlo experiment;
(1) For each I e I, the N i parameter vector is modeled according to the w i (θ) distribution, where N i/Np≈πi, The first simulation vector extracted from w i (θ) is denoted θ li;
(2) For each θ li, generate an N M analog measurement; the mth simulation for a given θ li measures z mli, the total amount of samples generated by the simulation is N PNM;
(3) Dividing the two-dimensional observation space gamma into a large number of small rectangular units with uniform size; each cell belongs to a single judging area, so that all observation samples falling in the cells belonging to the gamma i are equivalently allocated to the hypothesis H i, I epsilon I, each cell is allocated to the hypothesis H i with the maximum number of samples gamma in the cell, an initial partition of z mli is created, the boundary is adjusted, each cell is guaranteed to belong to only one type, namely a certain type of sample point in the cell is the most, all the cells are set to belong to the type, and each judging area gamma i is communicated singly;
(4) As long as the resulting decision area remains single connected, the new assignment remains unchanged as long as the bayesian risk r (δ) is reduced; repeatedly changing the area of the boundary area, changing the area into the currently set area if the Bayesian risk is reduced, and keeping the original area until no boundary unit needs to be reassigned, wherein the unit assignment forms a final judgment area gamma i at the moment, I epsilon I if the Bayesian risk is not reduced;
the bayesian risk r (δ) at this time is expressed as:
wherein the cost function C [ i, θ ] is defined as follows:
Writing the cost function to C ij,Cij represents the cost of selecting H i when H j is true; when i=j, cost C ij =0, otherwise, cost C ij =1; however, in a practical scenario, not all misclassifications will have the same cost, and the cost is set as follows:
Modeling to generate sample points, performing small block division on the whole area, and visually obtaining an initial area by using the sample points; the assignment of the boundary region is replaced continuously, so that the Bayesian risk is minimum, and a final decision region, namely an optimal decision region, is obtained;
After the optimal region is obtained, the sample point can be regenerated, the region to which the sample point belongs is known, and the determination is carried out in the optimal decision region by utilizing the power value and early-late gate metric value of the sample point, so as to re-determine which region the sample point belongs to; and a large number of samples are generated for experiments, and the probability obtained by comparing the determined belonging area with the original area is counted, so that the larger the probability is, the better the performance is.
2. The satellite navigation signal anti-spoofing authentication method of claim 1, wherein:
In the third step, in order to find δ (z) of the optimal decision criterion, each parameter set Λi, I e I and condition distribution w i (θ), I e I;
(1) H 0 is free from interference;
In the absence of interference, the parameter set is defined as:
Λ0={θ∈Λ∣η=0} (12)
The three marginal distributions of w 1 (x) are: w η0 (x) is a dirac delta function, w τ0 (x) and w θ0 (x) are arbitrarily defined;
(2) H 1 multipath;
in multipath situations, the parameter set is defined as:
Λ1={θ∈Λ∣0<η<1,0<Δτ<Tc} (13)
the three marginal distributions of w 2 (x) are: w η1 (x) is logarithmic distribution with a mean value of-21 dB and a standard deviation of 5dB, w Δτ1(x)=μ-1e-x/μ, x is more than or equal to 0, wherein mu is related to satellite pitch angle, and w θ1 (x) is uniformly distributed on [0,2 pi);
(3) H 2 deception jamming
In case of spoofing interference, the parameter set is defined as:
Λ2={θ∈Λ∣1≤η,0<|Δτ|<Tc} (14)
The three marginal distributions of w 2 (x) are: w η2 (x) is a logarithmic distribution with a mean of 1dB and a standard deviation of 1dB, w Δτ2 (x) is an exponential distribution with a parameter μ=120, w θ2 (x) is uniformly distributed over [0,2 pi);
(4) H 3 suppression type interference
In case of interference at compacting, the parameter set is defined as:
Λ3={θ∈Λ∣1≤η,|Δτ|≥Tc} (15)
the three marginal distributions of w 3 (x) are: w η3 (x) is a dirac delta function, w τ3 (x) and w θ3 (x) are arbitrarily defined.
3. The satellite navigation signal anti-spoofing authentication method of claim 1, wherein:
in the fourth step, the specific cases are as follows:
(1) In the case of no interference or only one multipath signal or only one spoofing interference, i.e., P Ai=PA,i=0,...,Ms and η i=0,i=1,...,Ms; at this time, the liquid crystal display device,
(2) In the case of a jammer, i.e., each of the M s +1 received signals is modeled as having a power P A, and each signal is affected by an incoherent interference signal having a power ηp A, at this point,
(3) In the case of spoofing, i.e. spoofing not only for real signals, but also for multiple access signals, at this point,
CN202111051208.2A 2021-09-08 2021-09-08 Anti-spoofing authentication method for satellite navigation signals Active CN113805200B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111051208.2A CN113805200B (en) 2021-09-08 2021-09-08 Anti-spoofing authentication method for satellite navigation signals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111051208.2A CN113805200B (en) 2021-09-08 2021-09-08 Anti-spoofing authentication method for satellite navigation signals

Publications (2)

Publication Number Publication Date
CN113805200A CN113805200A (en) 2021-12-17
CN113805200B true CN113805200B (en) 2024-05-24

Family

ID=78894846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111051208.2A Active CN113805200B (en) 2021-09-08 2021-09-08 Anti-spoofing authentication method for satellite navigation signals

Country Status (1)

Country Link
CN (1) CN113805200B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009141453A1 (en) * 2008-05-23 2009-11-26 Thales System and method for multi-correlation with modulation-adapted filter for the fast acquisition and the tracking of a radio navigation signal in the presence of jamming
CN104155662A (en) * 2014-08-05 2014-11-19 中国空间技术研究院 Self-adaptive mutual interference restraining method based on GNSS (global navigation satellite system) related peak value detector
CN111158023A (en) * 2019-12-27 2020-05-15 中国人民解放军军事科学院国防科技创新研究院 Receiver terminal anti-interference method based on low-earth orbit satellite
CN112946694A (en) * 2021-02-19 2021-06-11 国网上海市电力公司 Satellite navigation deception signal detection method and system based on distribution goodness of fit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009141453A1 (en) * 2008-05-23 2009-11-26 Thales System and method for multi-correlation with modulation-adapted filter for the fast acquisition and the tracking of a radio navigation signal in the presence of jamming
CN104155662A (en) * 2014-08-05 2014-11-19 中国空间技术研究院 Self-adaptive mutual interference restraining method based on GNSS (global navigation satellite system) related peak value detector
CN111158023A (en) * 2019-12-27 2020-05-15 中国人民解放军军事科学院国防科技创新研究院 Receiver terminal anti-interference method based on low-earth orbit satellite
CN112946694A (en) * 2021-02-19 2021-06-11 国网上海市电力公司 Satellite navigation deception signal detection method and system based on distribution goodness of fit

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
频域空时域级联导航抗干扰技术研究;徐娟;姚如贵;陈;王伶;张兆林;;弹箭与制导学报;20150415(第02期);全文 *

Also Published As

Publication number Publication date
CN113805200A (en) 2021-12-17

Similar Documents

Publication Publication Date Title
US7203489B2 (en) Measurement based prediction method for radiation path loss
Munari et al. Stochastic geometry interference analysis of radar network performance
CN110471091B (en) Deception jamming detection method based on orthogonal component of correlator
Alsindi et al. Analysis of time of arrival estimation using wideband measurements of indoor radio propagations
CN109359270A (en) The threshold model method for building up of Beidou ground strengthening system integrity Risk Monitoring
CN1972165B (en) An interference detection method and apparatus
Wölfle et al. Enhanced localization technique within urban and indoor environments based on accurate and fast propagation models
CN102710345B (en) Cognition radio frequency spectrum sensing method based on multi-antenna Friedman inspection
CN113534067B (en) Multi-station radar deception jamming resisting method and system under multiple interference sources
CN102013928B (en) Fast spectrum perception method in cognitive radio system
CN112558034A (en) Extended target sensitive detector and system during subspace signal mismatch
CN108983165A (en) The anti-Deceiving interference method of netted radar system based on substation selection
Alymani et al. Rician K-factor estimation using deep learning
CN113805200B (en) Anti-spoofing authentication method for satellite navigation signals
Labib et al. A stochastic optimization approach for spectrum sharing of radar and LTE systems
Tani et al. Performance evaluation of a precorrelation interference detection algorithm for the GNSS based on nonparametrical spectral estimation
WO2010045784A1 (en) Method and device for determining mobile communication interference source
CN111770528A (en) Sight distance and non-sight distance identification method and device based on channel parameter extraction method
Kim et al. Robust spectrum sensing under noise uncertainty for spectrum sharing
Quitin et al. Extracting specular-diffuse clusters from MIMO channel measurements
KR20150011919A (en) Determining method for presence of primary user&#39;s signal using spectrum sensing and spectrum sensing apparatus
Brida et al. Wireless sensor localization using enhanced DV-AoA algorithm
CN111263382B (en) Method, device and equipment for determining problem source cell causing overlapping coverage
CN115549827B (en) Blind spectrum sensing method, system, computer equipment and terminal
Jun et al. Novel autocorrelation based spectrum sensing methods for cognitive radios

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant