亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Airborne GNSS-Receiver Threat Detection in No-Fading Environments

        2023-01-07 09:14:44OmidSharifiTehrani

        Omid Sharifi-Tehrani

        Abstract: Jamming and spoofing detection of global navigation satellite systems (GNSS) is of great importance. Civil and military aerial platforms use GNSS as main navigation systems and these systems are main target of threat attacks. In this paper a simple method based on different empirical probability density functions of successive received signal powers and goodness of fit technique is proposed for airborne platforms such as unmanned aerial vehicle (UAV), in no fading environment. The two different paths between UAV-satellite and UAV-threat, experience different empirical probability density functions which can be used to distinguish between authentic and threat signals. Simulation results including detection and false alarm probabilities show good performance of proposed method as well as low computational burden.

        Keywords: detection; global navigation satellite systems (GNSS); jamming; spoofing; unmanned aerial vehicle

        1 Introduction

        Jamming, interference and spoofing immunity is one part of the most important issues in global navigation satellite systems (GNSS) [1].Demands for resistance of GNSS against jamming and spoofing in aerial platforms have been increased in recent decades. Unmanned aerial vehicles (UAV), helicopters, fighters and commercial aircrafts use GNSS as primary navigation system.

        Also other alternative avionic systems like inertial navigation system (INS), Gyro, magnetic compass, very-high-frequency omnidirectional range with distance-measuring equipment(VOR/DME) and tactical air navigation(TACAN) are used as auxiliary navigation aids,but primary systems that are responsible for navigation are global positioning system (GPS),GLONASS, GALILEO and other GNSS. Due to weak signals of GNSS satellites received by aerial and ground-based platforms, intentional and unintentional interferences can easily disrupt GNSS services partially or completely [2]. Thus,early detection of jamming and spoofing as modern threats can help users to make decision and do preemptive or defensive actions. Different algorithms and methods have been developed in detection domain. Some methods are based on transfer domain such as fast Fourier transform(FFT), short-time Fourier transform (STFT)and spectrogram [3]. Eigenvalue and eigenvector analysis in conjunction with Wigner-Ville and Marcenko-Pastur laws are another methods [4, 5].Space-time adaptive processing (STAP) by using antenna array is one of the most powerful methods in detection and mitigation of unwanted signals but they have high computational complexity and hardware burden [6-11]. Some algorithms are based on normality tests and have blind spots [12-14]. The monitoring of possible distortions in the received signal correlation, can be used for spoofing detection. This method is called ratio-metric [15]. The disadvantage of this method is the need for post-correlation calculations. In [16] the pseudo-range differences method is proposed for a single receiver, capable of detecting simplistic and intermediate spoofing threats. This method also requires post-correlation calculations. Signal quality monitoring(SQM) technique is another method for spoofing detection which is spoofing detection effectiveness utilizing a single SQM metric, and is conditional and limited based on the signal extracted features [17]. Obviously the computational burden of this method is not low. The strategy of combining several metrics can improve the performance of the defense, in terms of detection and false alarm probabilities. Several methods have been introduced in this regard including combination of SQM, carrier-to-noise moving variance, moving average, signal distortion, etc.Although the performance gets better through metrics combination, the complexity increases as well [18-21]. Using signal power measurements is one of the simple methods to detect GNSS spoofing attack [22, 23]. Although it has low computational complexity, the performance is lower than other newer methods. Its performance could deteriorate if the spoofer is smart enough to handle the power of the threat signal. Other methods such as artificial neural networks (ANN) and wavelet transform have also been used in this regard [24-27]. Apart from which method to use,simplicity and computational complexity are two important parameters when hardware implementation and real-time performance matter. Most of aforementioned algorithms have high computational complexity. In this paper, a new method based on empirical probability density function comparison is introduced for utilization in unmanned aerial vehicles, as well as other aerial platforms, which has low computational complexity and can be used as early detection and warning. The proposed method takes advantage of aerial platform movement and uses successive received signal powers. Some of the existing methods for spoofing detection that are based on the power measurements, simply compare the received signal power with an known average power and if it is greater than the average threshold, it is concluded that the signal is spoofing and not authentic. But the performance will get worse if the spoofer is smart enough to control the transmitted power accordingly. The proposed method in this paper is based on the distribution of the power which means the two different paths between UAV-satellite and UAVthreat, experience different empirical probability density functions and thus no function of the average received power threshold. Hence it can be assumed stand-alone. This paper is organized as follows. In section 2 and 3 the problem and scenario assumptions are stated. In section 4 the proposed algorithm is described and finally, simulation results and conclusion are provided.

        2 Problem Statement

        We can model the received signal from theith satellite as [5, 28]

        whereAi(t) is the signal amplitude which is related to theith satellite power amplifier (PA),is theith GPS signal Doppler frequency,φiis the random phase of signal,fcis the carrier frequency,Ci(t) is the unique spreading code of theith satellite,di(t) is the navigation message,τiis the channel delay,ηis the receiver noise, andtis the index of time. The product ofAi(t)Ci(t)di(t)can be assumed like a modulation factor for the cosine base signal. The received GNSS radio frequency (RF) signal from theith satellite, in the receiver is modeled as

        whereJRF(t)=AJcos(2πfJt+φ0) is the jammer signal,fJis the jammer frequency,AJis the jammer signal amplitude,φ0is the jammer initial signal phase andηis receiver additive white Gaussian noise. Jamming (J) to noise (N) ratio isJ/N=A2J/2ηand jamming to signal (S) ratio isJ/S=A2/A2. There are three necessary observa-Jitions for GPS which are pseudo-range, Doppler and carrier phase measurements.

        3 Scenario Assumptions

        The aerial platform flies with nearly fixed altitude which is called cruise altitude. Maximum altitude of UAV is known and is approximately 40 000 feet. The minimum and maximum speeds are known which are 120 km/h to 300 km/h with nominal cruise speed between 150 km/h to 200 km/h. The operational radius of threat source is known and limited. Threat source is a static ground-based / maritime single-spot narrowband one. UAV is at the distance of 10 km away from threat and ground threat power is such that in the distance of 10 km (UAV position) is equal to authentic GPS signal power received by UAV from GNSS satellite (carrier to threat ratio is 0 dB). UAV velocity is fixed and equal to 180 km/h which is equal to 262.5 Hz Doppler relative to ground threat and its motion is toward the threat source. The assumed scenario is shown in Fig. 1.

        Fig. 1 Assumed scenario in no fading environment

        4 Algorithm Description

        Because of fixed velocity UAV motion to threat zone, the distance between UAV and groundbased jammer/spoofer could be considered as a uniform random variabledUAV-Threat~U(a,b).Therefore by utilizing received signal power relation in logarithm domain we have

        wherePT,GTandGRare transmit signal power,transmit antenna gain and received antenna gain respectively and are considered as constant values in decibel,Fis the frequency of the signal,andPReceivedis the received power. Hence we can approximately say

        4.1 Normality Assumption for UAV Altitude Changes

        Because in the cruise profile operation of UAV,the altitude is not usually fixed and has few changes including increasing and decreasing as pseudo random, so the distance random variable between UAV and satellite is considered as a normal random variable in which the mean is equal to UAV cruise flight altitude and variance is equal to few changes in altitude. So we can approximately say

        wheredUAV-SATmeans the distance between UAV and SAT,μUAV-SATmeans the mean value, andσUAV-SATmeans the standard deviation. Because the logarithm of this random variable is used, it is necessary to study its logarithm behavior. For simplicity we assume that the random variable is standard normal.

        Thus, the probability density function (PDF)has log-concavity feature and is a log-concave function. Prekopa [29-31] proved that log-concavity feature of functions is also transferred to their integrals.

        1) Theorem 1

        Suppose thatgis a probability density function with support (a,b) andGis its cumulative distribution. Ifgis continuously differentiable and has log-concavity feature over (a,b), thenGis also log-concave over (a,b) [29, 30].

        2) Theorem 2

        AssumeGis a function with positive values,twice differentiable with support (a,b).Tis a uniform function and twice differentiable from(a′,b′)to (a,b)=(T(a′),T(b′)). FunctionG︿with support (a′,b′) is defined such that for allx ∈(a′,b′)we haveG︿(x)=G(T(x)). In this case ifGhas log-concavity feature andTtransform is a concave function, thenG︿will be log-concave as well.

        3) Proof

        wherefξis the PDF andfdUAV-SATis PDF ofdUAV-SAT.So the UAV successive received signal powers from satellite have a different probability density function. Now by utilizing different empirical probability density functions, detection of threat is done.

        4.2 PLGoF Proposed Method

        In this method, we use empirical probability density function comparison and their differences.Goodness of fit (GoF) method based on mean squared error (MSE) function explores whether a sample dataset comes from a set with specific distribution or not. So the hypothesis test can be written as

        wherePReferencemeans the reference probability to compare with. GoF relation based on MSE cost function is

        whereNis the sample size,xis observed values from histogram binning process of received signal powers andxReferenceis expected values form histogram binning process of received signal powers in learning phase. Fit output value has different values for authentic and threat signal empirical cumulative distribution functions (CDF). Adequate threshold level is selected based on Monte Carlo (MC) simulation trials. Path-loss goodness of fit (PLGoF) algorithm steps are depicted in Fig. 2.

        Fig. 2 Entity relationship diagram: (a) proposed method steps; (b) learning phase

        4.3 Learning Phase

        In the proposed method, GNSS authentic signal features are used as reference. Thus these features should be obtained in clear environment.This phase is learning phase and is depicted in Fig. 2.

        PLGoF algorithm steps are summarized in Tab. 1.

        Tab. 1 PLGoF algorithm steps summary

        5 Simulation Results Utilizing Real GPS Signal Dataset

        In this section by using real GPS signal dataset,performance of the proposed Algorithm is evaluated and compared with some other methods(Anderson-Darling (AD), Jarque-Bera (JB) and Lilliefors (LILLIE)). Sampling frequency is 6.4 MHz, central frequency is 1.575 42 GHz, 5 MHz span and the number of the recorded samples is 16 383 488 which are captured by Tektronix RSA3408A Real-Time Spectrum Analyzer, Rojone A-GPSA95NS antenna, Rojone AMA-061B amplifier and direct current (DC) block [32].Simulations are based on the MC with 1 000 trials. The α-significance level is set to be 5%. The spoofing signal is generated as GPS signal recorddelay-broadcast scenario. Simulation results based on detection and false alarm probabilities are depicted in Fig. 3 and Fig. 4 in the presence of jammer and spoofer threat. As shown, based on assumed scenario and setting, the proposed method provides better detection probability in longer distances than other compared methods.Also, it provides false alarm probability below 10% as others which nearly confirms the preset α-significance level. In Fig. 5, typical MC simulations for different selected threshold levels are provided. A comparison between different algorithm features in the scope of this article application is done in Tab. 2.

        Fig. 3 Simulation results in the presence of jammer: (a) detection probabilities; (b) false alarm probabilities

        Fig. 4 Simulation results in the presence of spoofer: (a) detection probabilities; (b) false alarm probabilities

        Fig. 5 Detection and false alarm probabilities based on different threshold levels (detection probability (PD) , false alarm probability (PFA))

        Tab. 2 Comparison between different algorithm features in the scope of this article application

        As is evident from the simulation results, the proposed method shows better behavior in detection and false alarm probabilities. This is due to the utilization of goodness-of-fit criteria with empirical PDFs as well as learning phase performance.

        6 Conclusion

        A simple algorithm based on different empirical probability density functions (EPDF) of successive received signal powers and goodness of fit(GoF) technique was developed for aerial platforms such as UAV in no fading environment.The two different paths between UAV-satellite and UAV-threat experience different empirical probability density functions that were used to distinguish between authentic (GNSS) and threat (jamming or spoofing) signals. Simulation results containing detection and false alarm probabilities demonstrated good performance of proposed algorithm as well as low logical computational burden.

        无码专区亚洲avl| 久久久无码人妻精品一区| 亚洲av无码一区二区三区在线 | 夹得好湿真拔不出来了动态图| 成年无码av片完整版| 9久久精品视香蕉蕉| 国产亚洲精品综合在线网站| 亚洲国产精品成人久久久 | 啪啪免费网站| 男女干逼视频免费网站| 国内嫩模自拍诱惑免费视频| 亚洲色欲色欲www在线观看| 国产人成无码中文字幕| 色偷偷亚洲女人的天堂| 久久国产精品亚洲婷婷片| 成人久久久久久久久久久| 国产在线无码免费视频2021| 人妻中文字幕一区二区三区| 无码av天天av天天爽| a级国产乱理论片在线观看| 伊人狠狠色j香婷婷综合| av在线入口一区二区| av永久天堂一区二区三区| 伊人网综合在线视频| 日本精品久久中文字幕| 香蕉久久一区二区不卡无毒影院| 国产伦精品一区二区三区免费| 国产一区二区三区韩国| 日本一区二区三区清视频| 国产欧美一区二区三区在线看| 国产精品国产三级农村妇女| 日韩av中文字幕一卡二卡| 妺妺窝人体色www在线| 久久人人爽人人爽人人片av麻烦| 无码专区亚洲avl| 青青河边草免费在线看的视频| 久久精品噜噜噜成人| 色噜噜狠狠色综合中文字幕| 日本妇女高清一区二区三区| 好男人社区影院www| 亚洲综合久久久|