期刊文献+

复杂干扰环境下的卫星授时接收机加固技术 被引量:11

GNSS timing receiver toughen technique in complicated jamming environments
在线阅读 下载PDF
导出
摘要 对目前导航卫星授时接收机面临的干扰模型和应对措施进行了归纳总结。结合授时接收机工作原理和特点,给出了授时接收机加固的通用框架。在此基础上,对授时接收机加固技术的发展趋势进行了分析,提出了基于钟差辅助和网络辅助的两种干扰检测方法。前者充分利用了多系统多卫星钟差数据的冗余性和本地时钟的特性,后者则利用了授时接收机网络具备数据通信和广域覆盖的特点。通过干扰检测结果给出完好性评估并引导授时接收机的工作模式,可以提升复杂干扰环境下卫星授时的可靠性和完好性。 The threat models and spoofing attack detection technology about navigation satellite timing receiver were summarized. Combined with the operating principle and characteristics of timing receiver, a general framework of timing receiver reinforcement technology was presented. On this basis, two interference detection methods of clock aided method and network aided method were proposed according to the analysis of development tendency of timing receiver reinforcement technology. The former took the advantage of multi satellite eloek difference redundancy and the local clock characteristics, while the latter took the advantage of the GNSS timing receiver network with the characteristics of data communication and wide coverage. The interference detection results can be used to integrity assessment and guide the GNSS timing receiver working mode, thus improving the satellite timing reliability and integrity in complicated interference environment.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2015年第3期1-9,20,共10页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(61403413)
关键词 卫星导航 干扰 欺骗 授时接收机 干扰监测 欺骗检测 satellite navigation interference spoofing timing receiver interference monitoring spoofing detection
  • 相关文献

参考文献58

  • 1Gould J. Ausa: army seeks new positioning tech [ N ]. Defense News, 2014, 10:18.
  • 2Last D D. GPS: the present imperfect [ J ]. Inside GNSS, 2010, 05:60-64.
  • 3Giray S M. Anatomy of unmanned aerial vehicle hijacking with signal spoofing [ C ]//Proceedings of International Conference on Recent Advances in Space Technologies, IEEE, 2013 : 795 - 800.
  • 4Shepard D P, Bhatti J A, Humphreys T E, et al. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks [ C ]// Proceedings of the 25th International Technical Meeting of the Satellite Division of the Institute of Navigation, 2012 : 3591 - 3605.
  • 5Kerns A J, Shepard D P, Bhatti J A, et al. Unmanned aircraft capture and control via GPS spoofing [ J ]. Journal of Field Robotics, 2014, 31 (4): 617-636.
  • 6Shepard D P, Humphreys T E, Fansler A A. Going up against time: the power grid's vulnerability to GPS spoofing attacks[ J]. GPS World, 2012(8) :34 -38.
  • 7Parkinson B W. Assured PNT for our future: PTA [ J ]. GPS World, 2014(9) :24 -31.
  • 8Dovis F, Musumeci L, Linty N, et al. Recent trends in interference mitigation and spoofing detection[ J]. International Journal of Embedded and Real-Time Communication Systems, 2012, 3(3): 1-17.
  • 9Shepard D. Characterization of receiver response to spoofing attacks [ D ]. USA : University of Texas at Austin, 2011.
  • 10黄龙,吕志成,王飞雪.针对卫星导航接收机的欺骗干扰研究[J].宇航学报,2012,33(7):884-890. 被引量:54

二级参考文献111

共引文献133

同被引文献77

引证文献11

二级引证文献73

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部