亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Navigation jamming signal recognition based on long short-term memory neural networks

        2022-09-03 08:26:36FUDongLIXiangjunMOUWeihuaMAMingandOUGang

        FU Dong,LI Xiangjun,MOU Weihua,MA Ming,and OU Gang

        College of Electronic Science and Technology,National University of Defense Technology,Changsha 410005,China

        Abstract: This paper introduces the time-frequency analyzed long short-term memory (TF-LSTM) neural network method for jamming signal recognition over the Global Navigation Satellite System (GNSS) receiver.The method introduces the long shortterm memory (LSTM) neural network into the recognition algorithm and combines the time-frequency (TF) analysis for signal preprocessing.Five kinds of navigation jamming signals including white Gaussian noise (WGN),pulse jamming,sweep jamming,audio jamming,and spread spectrum jamming are used as input for training and recognition.Since the signal parameters and quantity are unknown in the actual scenario,this work builds a data set containing multiple kinds and parameters jamming to train the TF-LSTM.The performance of this method is evaluated by simulations and experiments.The method has higher recognition accuracy and better robustness than the existing methods,such as LSTM and the convolutional neural network (CNN).

        Keywords: satellite navigation,jamming recognition,time-frequency (TF) analysis,long short-term memory (LSTM).

        1.Introduction

        The global navigation satellite system (GNSS) is widely utilized in an abundance of applications.Critical infrastructures such as cellular towers,the power grid and even financial trading institutions can be disrupted if the GNSS receivers are jammed.Accurate recognition of navigation jamming signals is the premise of monitoring and suppression.However,jamming signal identification with high accuracy is not an easy task at present.

        Traditional navigation jamming signal classifiers are designed based on the time,frequency or time-frequency(TF) domain features of the signal.The threshold determination and implementation of the algorithm are complex,and its performance in a low signal to noise ratio(SNR) is not satisfactory [1-3].The shallow neural network is also used to recognize the jamming signal in recent years.Mosavi et al.[4] used multi-layer perceptron for narrowband jamming tracking and suppression,it cannot recognize other types of jamming signals.Wang et al.[5] classified jamming signals based on back propagation (BP) neural network,but the jamming existence factor,bandwidth,spectral kurtosis,and average spectral flatness coefficient are required.

        Deep neural network (DNN) including convolutional neural network (CNN) and recurrent neural network(RNN) has been widely used in signal processing and recognition.A large number of studies show how to use CNN to classify jamming signals in communication systems [6-10],or to classify transient radio frequency interference [11].In addition,CNN is also widely used in signal modulation recognition [12,13],time series classification [14],and image target classification [15].The long short-term memory (LSTM) neural network is proposed to solve the problem of gradient disappearance and explosion in the training process of ordinary RNN [16].It is better at learning the dependence between signal sequences than other RNN,such as solar radio spectrum,machine fault diagnosis [17],abnormal electrocardiogram signals [18,19].Moreover,LSTM is also used for signal modulation identification [9,20].In terms of jamming recognition,LSTM is used for radar emitter [21]and wireless interference signal recognition [8,22],radio frequency signal classification [23].

        The recent success of DNN in jamming classification in other fields suggests that the recognition of navigation jamming can benefit from it.Thus,researchers start using CNN in the navigation,but the case of using LSTM has not been found.Wu.et al [24] used one-dimensional CNN to extract jamming signal features for classification.However,retraining CNN under different parameter conditions seriously limits the practicability of the method.The adaptability of CNN to the variation of jamming signal parameters such as the period of pulse jamming,the frequency sweep rate of sweep jamming,etc.,has not been discussed.Li et al.[25] used the smooth pseudo Wigner-Ville distribution to convert jamming signals into images,then extracted image features for recognition with CNN.Although the method can classify signals in a certain range of parameters,it takes a lot of memory and signal processing resources.

        This paper proposes a method named TF-LSTM to recognize navigation jamming signals with high accuracy in real scenarios.This idea is based on two facts:

        (i) The jamming signal varies continuously and dependently over time,and provides an opportunity for the application of LSTM.

        (ii) TF can extract signal parameters for jamming suppression and enhance signal features [2,3].

        Our contributions include the following:

        (i) The LSTM is introduced into the navigation jamming recognition and the TF is used for signal preprocessing.

        (ii) For the first time,the adaptability of the recognition method to the range of navigation jamming signal parameters is researched.

        (iii) Several groups of comparative studies prove the advantages of the new method in recognizing single and multiple jamming signals over a wide range of parameter variations in actual scenarios.

        The model of the jamming signal recognition system is introduced in Section 2,as well as the mathematical model of the navigation jamming signal.This work explains the principles of TF analysis,LSTM and signal feature extraction in Section 3.The performance of different methods is discussed by simulations and experiments in Section 4.

        2.System description

        2.1 System model

        The GNSS user receives a radio frequency (RF) signal within a certain bandwidth,obtains an intermediate frequency signal through down-conversion and filtering,then performs acquisition and tracking.The jamming still exists in the intermediate frequency (IF) signal after down-conversion if there are jamming signals in the received bandwidth,so the recognition of the navigation jamming signals can be completed within the IF bandwidth.The principle of the navigation jamming signal recognition system designed in this paper is shown in Fig.1,which consists of a signal collection module and a signal analysis module.The collection module receives the signal through the antenna,converts the RF signal by downconversion,sampling and quantization into a digital IF signal stream,then sends it to the analysis module through the network protocol.After pre-processing the signal by TF analysis,the signal analysis module runs the recognition algorithm by using the trained neural network parameters,and performs operations including recording and early warning according to the classification results to provide reference for the subsequent jamming mitigation module.The functions in the blue dashed box are implemented by LSTM neural network.

        2.2 Jamming signal model

        The RF signal received by the antenna is expressed as

        whereS(t) is the navigation signal in the frequency band,J(t) is the jamming signal,andn(t) is the noise in the environment.Since the navigation signal power is much lower than the noise and the jamming signal,this work focuses on the power relationship between the jamming signal and the noise,which is measured by the jamming to noise ratio (JNR).

        The navigation jamming signals researched in this work include pulse jamming,sweep jamming,audio jamming,and spread spectrum jamming.

        Pulse jamming is a kind of jamming obtained by modulating a pulse signal to a single frequency carrier,the pulse signal is in the form of a square wave,its timedomain signal expression is

        where τ andTare the pulse width and repetition period;Ap,fp,and φpare the amplitude,frequency,and initial phase of the carrier respectively.

        Sweep jamming in this paper changes the centre frequency linearly with time.In addition,its amplitude may also change with time in some cases,and it can cover a larger bandwidth in the frequency domain within a period of time.The time domain signal expression is

        whereAsis the signal amplitude,Tis the dwell time of a certain frequency point,f0is the initial frequency,andKis the constant coefficient of frequency change with time.

        Audio jamming refers to a cosine signal with a single frequency that can interfere with a certain frequency point.It is the basic form of multi-tone jamming.The time domain expression is

        whereAa,fa,and φaare the jamming signal amplitude,frequency,and initial phase respectively.The difference in the initial phase generally does not cause the jamming effect to change.

        Spread spectrum jamming usually refers to direct sequence spread spectrum (DSSS) signals.Depending on the spreading code rate,the navigation signal at the target frequency point will cause narrowband or wideband jamming.The time domain signal expression is

        whereC(t) is the spreading code of carrier modulation.AD,fD,and φDare the amplitude,frequency,and phase of the carrier respectively.

        3.Recognition algorithm

        Inspired by mechanical fault diagnosis methods [26],this work uses TF analysis to strengthen signal features,then LSTM is used to extract them.

        3.1 TF analysis

        TF analysis transforms the signal from the time domain to the TF domain.Signal features are similar in the time or frequency domain,which sometimes can be easily distinguished in the TF domain.The TF analysis methods used in this paper include the instantaneous frequency and the spectral entropy.

        The instantaneous frequency of a non-stationary signal is a parameter that changes with time and is related to the average value of the frequencies present in the signal.When calculating the instantaneous frequency,using the short-time Fourier transform to calculate the TF power spectrum matrixS(t,f) of the input signal first,the number of rows is equal to the number of discrete Fourier transform (DFT) points,the number of columnsk=(Nx-L)/(M-L)」,Nxrepresents the length of the original signal,andx」 represents roundingxdown.Therefore,theS(t,f) matrix is expressed as

        Themth element inS(t,f) is

        wherex(n) is a discrete time domain signal,g(n) is the window function ofMpoint length,andXm(f) is the DFT of the data in the window centre on timemR.Ris the number of data points skipped between two consecutive DFT.Its size is the difference between the window lengthMand the overlap lengthL.Then the instantaneous frequency is estimated [27,28] as

        The spectral entropy of a signal is a measure of its spectral power distribution.The spectral entropy regards the normalized power distribution of the signal in the frequency domain as a probability distribution and calculates its information entropy.The information entropy is the spectral entropy in this case [29,30].For signalx(n),if the TF power spectrumS(t,f) is known,the probability distributionP(m) is

        whereS(t,m) is the TF power spectrum at a certain frequencym,then the spectral entropy is

        The probability distribution of the given TF power spectrumS(t,f) attis

        Then the spectrum entropy attis

        Calculate the instantaneous frequency and the spectral entropy of the non-jamming white Gaussian noise(WGN),pulse jamming,sweep jamming,audio jamming and spread spectrum jamming respectively in IF bandwidth.The TF analysis can be regarded as data pre-processing before LSTM training.As can be seen from Fig.2,the pre-processing strengthens the features of the jamming signal.The jamming signal parameters are shown in Table 1.As shown in Fig.2,the top of each panel is the original time-domain sequence,the middle and the bottom of each panel are the instantaneous frequency and the spectral entropy sequences respectively.It can be seen that the feature between the time domain sequences of different signals is not obvious.

        Fig.2 TF analysis results of jamming signals

        Table 1 Jamming signal parameters

        However,for the instantaneous frequency sequence,there are significant differences between jamming signals.WGN has a wider distribution in the frequency domain than other jamming signals,so the sequence fluctuates in a large range.In a pulse period of pulse jamming,the value of instantaneous frequency alternates between noise and carrier frequency.Sweep jamming linearly increases or decreases the instantaneous frequency with time.The frequency of audio jamming remains constant for a long time.The instantaneous frequency of spread spectrum jamming fluctuates around the carrier frequency,the higher code rate,and the larger range occupied for the sequence.

        It is the same for the spectral entropy sequence.The sequence value of WGN is the largest.For pulse jamming,when there is a signal in the pulse period,the spectrum entropy mainly depends on the spectrum entropy of the carrier or it is similar to the spectrum entropy of noise.Change of frequency basically does not affect the power distribution for sweep jamming.For spread spectrum jamming,the value of the sequence between audio jamming and white noise is significantly different from other jamming signals.

        Combining the two TF sequences will be benefit to distinguish the features of the jamming signal than the time domain sequences.The advantages of TF analysis is be shown in simulation and experiment.

        3.2 LSTM neural networks

        The standard RNN has a chain structure of repeating neural network modules,and there is only one nonlinear tanh function layer inside the repeating module,while the repeating module of LSTM has a more complex structure.The internal structure of each cell of the LSTM is shown in Fig.3.

        Fig.3 LSTM cell structure

        In Fig.3,? is Hadamard multiplication,that is,the corresponding elements in the matrix are multiplied.⊕ is matrix addition.The working principle of LSTM mainly has the following four parts:

        (i) Decide to discard information.The first step in LSTM is to determine the information discarded from the cell state,which is determined by a forget gate gating signal:

        wherezfis the splicing vector multiplied by the weight matrix,and then converted to a number between 0 and 1 through a sigmoid activation function as the gated state of the forgotten gate.1 means completely reserved,and 0 means completely discarded.

        (ii) Confirm the update information.The next step is to determine the new information stored in the cell state.There are two parts.The first part is the input data,which creates an updated candidate value vector,and the second part is the calculation of the input gate,which determines whether the input data in the first part is updated:

        whereziis the state of the update gate,zis the value between -1 and 1 after the splicing vector is multiplied by the weight and converted into a value between -1 and 1 through the tanh activation function,which is used as the input data of the module,and the two together generate an update to the state.

        (iii) Update the cell status.The first two steps have determined the upcoming operation,and this step is actually completed.Take the old statect-1Hadamard multiplicatezf,as discard the information determined to be discarded in (i),then add the updated information jointly determined by the two parts in (ii) to obtain the new state valuectas

        (iv) Confirm the output information.The output also includes two parts: one is based on the updated cell state to create the output candidate value vector,the other is to calculate the gated state of the output gate.The two parts jointly determineing the output information are

        wherezois the state of the output gate;htis the final output data obtained by Hadamard multiplication ofzoandctthrough the tanh activation function.

        The cell state is similar to a conveyor belt,with only a few linear interactions,so it is easy for the information to be transmitted on it to remain unchanged.LSTM removes or adds information to the cell state,useful features are remembered and useless features are forgotten.There are usually two chain structures of the LSTM neural network:one is the LSTM layer composed of ordinary unidirectional chains,and the other is the bidirectional LSTM(BiLSTM) layer combined of forward and backward chain.BiLSTM is more conducive to sequence features extraction [31].

        The LSTM network contains five layers including a sequence input layer and a class output layer.The two input sequences are obtained by pre-processing the original jamming signal by the TF analysis in Subsection 3.1.The second layer is BiLSTM containing 200 cells (100 forward and 100 backward),the output of the BiLSTM layer goes through a fully connected layer.The fully connected layer connects each node output by the BiLSTM with each node of the softmax layer.After two layers’operation,jamming signal features are extracted from the input.Then the softmax layer is used which can achieve good classification.In softmax regression,the probability that we classify inputxinto categoryjis calculated by

        where θ is the parameter of our model andkis the total class number.The softmax classifier calculates the exponent of each probability that the input belongs to each category and normalizes all exponential probability.It is widely used for classification problems.The specific parameters of the network are shown in Table 2.

        Table 2 LSTM neural network structure parameters

        4.Simulation and experiment

        The simulation and experiment use the same training and testing samples to compare the performance of CNN,LSTM,and TF-LSTM.The structure parameters of CNN refer to [24] and LSTM just has no time-frequency analysis part compared with TF-LSTM.

        4.1 Simulation results and discussion

        4.1.1 Neural network training

        The jamming signal for neural network training is generated according to the signal model in Subsection 2.2.In addition,WGN is regarded as non-jamming to detect the existence of other jamming signals.The jamming signal parameters are as follows:

        (i) Jamming types: WGN,pulse jamming,sweep jamming,audio jamming,and spread spectrum jamming.

        (ii) JNR range: -5 dB to 15 dB.

        (iii) Other parameters: the sample frequency is 125 MHz.The IF is 24 MHz.Pulse jamming: the pulse periodTis between 1 μs and 1 ms,the duty cycle τ/Tis 10%.Sweep jamming: the sweep frequency is between 1 555.42 MHz and 1 575.42 MHz,the sweep rateKis between 0.4 MHz/s and 400 MHz/s.Audio jamming: the carrier frequencyfais randomly generated between 1 555.42 MHz and 1 575.42 MHz.Spread spectrum jamming:C(t) is binary phase shift keying modulation,and the code rate is between 0.204 6 Mcps and 10.23 Mcps.

        (iv) Signal samples: the sample length is 10 240 points.Each kind of the jamming signal has 1 000 training samples.There are a total of 5 × 1 000=5 000 training samples.Randomly select JNR and other parameters.

        In order to test the recognition accuracy of different methods,this work uses the following test samples:

        (i) The JNRs of the test sample are -5 dB,0 dB,5 dB,10 dB,and 15 dB respectively.Other parameters are selected randomly and the range is the same as the training samples.There are a total of 5 × 5 × 1 000=25 000 samples.

        (ii) The JNR of the test sample is randomly generated between -5 dB and 15 dB.Pulse jamming,sweep jamming,and spread spectrum jamming parameters are shown in Table 3.There are a total of 4 × 3 × 1 000=12 000 samples.

        Table 3 Simulation jamming signal parameters

        (iii) The JNR and other parameters of the multiple jamming signals in each test sample are selected randomly as(i).There are a total of 5 × 1 000=5 000 samples.

        The test samples (i) correspond to the problem of JNR variations in the actual scenario,the test samples (ii) correspond to the blind classification problem where the jamming signal parameters are unknown,and the test samples (iii) mean multiple jammings appear at the same time in the actual scenario.

        4.1.2 Recognition accuracy

        In order to research the adaptability of different methods to JNR.Test and draw the recognition accuracy of CNN,LSTM and TF-LSTM under different JNRs in Fig.4.

        Fig.4 JNR adaptability simulation recognition accuracy

        It can be seen from Fig.4 that with the increase of the jamming signal JNR,the recognition accuracy of the audio and pulse jamming increases.The recognition accuracy of spread spectrum jamming does not change significantly,and even with the increase of JNR,the accuracy decreases slightly.This is because CNN and LSTM extract noise as part of the DSSS feature during training.The recognition accuracy of WGN and sweep is stable around 100%.It means that if there is jamming in the navigation frequency band,these methods can effectively detect it.Overall,the recognition accuracy of TFLSTM for all jamming signals is higher than that of CNN and LSTM under different JNRs.

        The adaptability of the different methods to jamming parameters is shown in Fig.5.At the same time,we also test the recognition accuracy of the different methods in multiple jamming scenarios,the results can be seen in Fig.6.

        Fig.5 Parameter adaptability simulation recognition accuracy

        Fig.6 Multiple jamming simulation recognition accuracy

        Fig.5 shows that there is a significant relationship between the recognition accuracy and the jamming parameters.The accuracy of pulse jamming is greatly reduced as the period reaches 1 ms for the three methods,because the sequence length corresponding to the excessive pulse period exceeds the feature extraction capability of CNN.Although the length of the sequence that LSTM can learn is limited,it still performs better than CNN.The sweep rate can be accurately identified in the order of 0.4 MHz/s—4 MHz/s for LSTM,but the sweep rate reaches 40 MHz/s or higher,its features are difficult to be extracted by CNN and TF-LSTM,especially CNN.When the code rate of spread spectrum jamming is lower than 1 Mcps,the recognition accuracy is significantly reduced for CNN.In addition,it is not possible to directly extract the sequence features for LSTM.Obviously,for the TF-LSTM,whether it is adaptable to JNR or other parameters,its performance is better than that of LSTM and CNN.

        Fig.6 illustrates that when multiple jammings appear at the same time,the recognition accuracy of CNN for each jamming signal changes dramatically,especially when two jammings appear,the LSTM also presents a similar result,while the recognition accuracy of TF-LSTM also decreases,but the decline is little,and the recognition accuracy is still the highest overall.It shows that the recognition accuracy of the three methods in the appearance of multiple jammings decreases to varying degrees,but the robustness and recognition accuracy of CNN and LSTM are not as good as TF-LSTM.

        4.2 Experimental results and discussions

        In this work,the experiment environment is placed in an open space.The platform of the jamming recognition research consists of receiving antennas,universal software radio peripheral (USRP) N300 and Laptop.The jamming signals are generated by a vector signal generator Agilent E4438C.

        The jamming signal used for neural network training is collected by the instrument on the right in Fig.7.The parameters of the jamming signal generated by Agilent E4438C are the same as those in the simulation part.

        Fig.7 Experiment scenario

        4.2.1 Neural network training

        In order to test the recognition accuracy of different methods,this work uses the following test samples:

        (i) The JNRs of the test sample are -5 dB,0 dB,5 dB,10 dB,and 15 dB respectively.Other parameters of jamming signals are randomly selected from Table 3,and there are a total of 5 × 5 × 1 000=25 000 samples.

        (ii) The JNR of the test sample is randomly selected from -5 dB—15 dB.Pulse jamming,sweep jamming and spread spectrum jamming parameters are those in Table 3,and there are a total of 4 × 3 × 1 000=12 000 samples.

        (iii) Limited by the experimental conditions,the JNR and other parameters of the two jamming signals in each test sample are traversed simultaneously from -5 dB to 15 dB and Table 3,respectively.There are a total of 5 ×1 000=5 000 samples.

        4.2.2 Recognition accuracy

        The recognition accuracy curve of the method under different JNRs is shown in Fig.8.The recognition accuracy under different parameters is shown in Fig.9.Meanwhile,Fig.10 shows the multiple jamming recognition accuracy.

        Fig.8 JNR adaptability experimental recognition accuracy

        Fig.9 Parameter adaptability experimental recognition accuracy

        Fig.10 Multiple jamming experimental recognition accuracy

        It can be seen from Fig.8 that with the increase of the jamming signal JNR,the recognition accuracy of most jamming signals is improved,and the recognition accuracy of WGN is still stable around 100%.In the experimental scenario,the reflection of ground in the environment causes multipath signals and other effects,and the actual instrument is difficult to generate jamming signals consistent with the simulation,so the results of the experiment are slightly different from simulation.However,the recognition accuracy of TF-LSTM is still the highest.

        The results in Fig.9 also show that there is a significant relationship between the recognition accuracy and the jamming parameters.The accuracy of pulse and spread spectrum jamming is consistent with the simulation results.However,the recognition accuracy for the sweep jamming is different from the simulation,because when Agilent E4438C generates sweep signals,there is at least 1 ms dwell time at a certain frequency,which leads to the recognition accuracy of LSTM decreasing and CNN increasing under the same conditions.TF-LSTM is still robust to parameter variations in a wide range.

        Fig.10 illustrates that when multiple jammings appear,CNN and LSTM show certain similarity with the simulation results,but the recognition accuracy of audio jamming and sweep jamming is maintained high.The recognition accuracy of TF-LSTM decreases slowly with the increase of jamming quantity,but the accuracy and robustness of TF-LSTM in multiple jamming scenarios are still the best.

        5.Conclusions

        To solve the problem of navigation jamming signal recognition with unknown JNR and other parameters in actual scenarios,a method named TF-LSTM is proposed.The combination of TF and LSTM improves the recognition ability of the GNSS receiver,which will be beneficial to the jamming parameter estimation and mitigation in the future.Several groups of comparative experiments show that the recognition accuracy of TF-LSTM is higher than that of CNN and LSTM,and it is robust to jamming parameters variations in a wide range and multiple jammings.

        国产成人久久精品区一区二区| 国产极品美女高潮无套| 欧美成人精品a∨在线观看 | 黑人老外3p爽粗大免费看视频| 久久精品无码av| 国产男女猛烈无遮挡免费视频| 日韩最新av一区二区| 麻豆国产精品一区二区三区| 色爱av综合网站| 亚洲日韩欧美国产另类综合| 亚洲日日噜噜噜夜夜爽爽| 免费在线亚洲视频观看| 日本少妇浓毛bbwbbwbbw| 精品国产精品久久一区免费式| 亚洲AV无码一区二区三区少妇av | 国产精品国产三级国产专区50| 丰满熟妇人妻av无码区| 婷婷丁香五月中文字幕| 久久久国产不卡一区二区| 毛片精品一区二区二区三区| 人人妻人人澡人人爽超污| 久久久久国产精品免费免费搜索 | 男女视频在线观看一区二区| 久久精品成人一区二区三区| 俺来也俺去啦最新在线| 成人国产在线观看高清不卡| 久久91精品国产一区二区| 亚洲欧美中文字幕5发布| 中文在线天堂网www| 亚洲av精品一区二区三| 欲女在线一区二区三区| 中文字幕一区二区三区乱码| 久久亚洲日本免费高清一区| 成人影院羞羞的视频免费观看| 在线播放真实国产乱子伦| 毛片免费全部无码播放| 亚洲av网站首页在线观看| 美女露出自己的性感大胸一尤内衣| 日韩人妻无码免费视频一区二区三区| 成人国产在线观看高清不卡| 一区二区三区视频亚洲|