期刊文献+

一种基于功率可行域的卫星导航欺骗干扰评估方法 被引量:1

Evaluation Method of Satellite Navigation Spoofing Based on Power Feasible Region
原文传递
导出
摘要 针对欺骗干扰评估场景复杂、反欺骗策略繁多等所导致的量化评估难度大的问题,建立了欺骗对抗场景到欺骗对抗效果的评估模型和映射过程,并从欺骗对抗场景中的功率空间和欺骗对抗效果中的欺骗有效概率出发,设计了基于欺骗有效功率可行域的评估方法与指标。仿真结果表明,该评估方法可以实现不同反欺骗策略之间性能的量化对比,能够为接收机反欺骗算法选择和优化提供量化评估方法。 Objectives:In view of the difficulty of quantitative evaluation caused by complex spoofing sce-narios and numerous anti-spoofing strategies,it is necessary to form effective indicators and methods for the evaluation of spoofing countermeasures.Methods:The evaluation model and mapping process from spoofing scenes to spoofing countermeasure effect are established.Based on the power space in the spoofing scenes and the spoofing effective probability in the spoofing countermeasure effect,the evaluation method and index based on the power feasible region are designed.Results:Through simulation,the quantitative evaluation results based on power feasible region of two spoofing countermeasure strategies are given,and the simulation results show that the evaluation method can realize the quantitative comparison of the perfor-mance of different anti-spoofing strategies.Conclusions:The indicator of the power feasible region can pro-vide a quantitative evaluation method forselection and optimization of the anti-spoofing algorithms in receivers.
作者 唐小妹 马鹏程 马春江 TANG Xiaomei;MA Pengcheng;MA Chunjiang(College of Electronic Science and Technology,National University of Defense Technology,Changsha 410073,China)
出处 《武汉大学学报(信息科学版)》 EI CAS CSCD 北大核心 2023年第7期1160-1169,共10页 Geomatics and Information Science of Wuhan University
基金 国家自然科学基金(U20A0193,62003354) 国家部委资助项目(2019-JCJQ-JJ-190)
关键词 卫星导航 欺骗干扰 功率空间 干扰评估 导航接收机 satellite navigation spoofing power feasible region spoofing evaluation navigation receiver
  • 相关文献

参考文献5

二级参考文献40

  • 1王晓音,詹毅,章军.直扩灵巧干扰技术的理论分析[J].通信对抗,2006(4):34-38. 被引量:4
  • 2王永超,黄智刚.时钟改进模型辅助RAIM算法研究[J].电子学报,2007,35(6):1084-1088. 被引量:14
  • 3Last D. GNSS.. The Present Imperfect[C]. DSK- TN Conference, London,2010.
  • 4Basker S. Jamming: A Clear and Present Danger [J]. GPS World, 2010,21(4):8-9.
  • 5Volpe J A. Vulnerability Assessment of the Trans portation Infrastructure Relying on the Global Posi tioning System [R]. National Transportation Re search Center, 2001.
  • 6Anonymous. Global Positioning System Impact to Critical Civil Infrastructure (GICCI) [R]. Naval Surface Warfare Center, 2009.
  • 7Becker G T, Sherman L, Lorenzo D, et al. Effi cient Authentication Mechanisms for Navigation Systems A Radio-Navigation Case Study[C]. ION GNSS Conference, Savannah, GA, 2009.
  • 8Montgomery P Y, Humphreys T E, Ledvina B M. A Multi-Antenna Defense: Receiver-Autonomous GPS Spoofing Detection[J].Inside GNSS, 2009,4 (2) :40-46.
  • 9European Space Agency. Galileo Open Service Sig- nal in Space Interface Control Document[R]. OS SIS ICD, Draftl, 2010.
  • 10Scott L. Location Assurance[J].GPS World, 2007, 18(7) :23-30.

共引文献110

同被引文献19

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部