引用本文: | 朱祥维,伍贻威,龚航,等.复杂干扰环境下的卫星授时接收机加固技术.[J].国防科技大学学报,2015,37(3):1-9,20.[点击复制] |
ZHU Xiangwei,WU Yiwei,GONG Hang,et al.GNSS timing receiver toughen technique in complicated jamming environments[J].Journal of National University of Defense Technology,2015,37(3):1-9,20[点击复制] |
|
|
|
本文已被:浏览 10334次 下载 7322次 |
复杂干扰环境下的卫星授时接收机加固技术 |
朱祥维, 伍贻威, 龚航, 刘文祥, 王飞雪 |
(国防科技大学 电子科学与工程学院,湖南 长沙 410073)
|
摘要: |
对目前导航卫星授时接收机面临的干扰模型和应对措施进行了归纳总结。结合授时接收机工作原理和特点,给出了授时接收机加固的通用框架。在此基础上,对授时接收机加固技术的发展趋势进行了分析,提出了基于钟差辅助和网络辅助的两种干扰检测方法。前者充分利用了多系统多卫星钟差数据的冗余性和本地时钟的特性,后者则利用了授时接收机网络具备数据通信和广域覆盖的特点。通过干扰检测结果给出完好性评估并引导授时接收机的工作模式,可以提升复杂干扰环境下卫星授时的可靠性和完好性。 |
关键词: 卫星导航 干扰 欺骗 授时接收机 干扰监测 欺骗检测 |
DOI:10.11887/j.cn.201503001 |
投稿日期:2015-03-27 |
基金项目:国家自然科学基金资助项目(61403413) |
|
GNSS timing receiver toughen technique in complicated jamming environments |
ZHU Xiangwei, WU Yiwei, GONG Hang, LIU Wenxiang, WANG Feixue |
(College of Electronic Science and Engineering, National University of Defense Technology, Changsha 410073, China)
|
Abstract: |
The threat models and spoofing attack detection technology about navigation satellite timing receiver were summarized. Combined with the operating principle and characteristics of timing receiver, a general framework of timing receiver reinforcement technology was presented. On this basis, two interference detection methods of clock aided method and network aided method were proposed according to the analysis of development tendency of timing receiver reinforcement technology. The former took the advantage of multi satellite clock difference redundancy and the local clock characteristics, while the latter took the advantage of the GNSS timing receiver network with the characteristics of data communication and wide coverage. The interference detection results can be used to integrity assessment and guide the GNSS timing receiver working mode, thus improving the satellite timing reliability and integrity in complicated interference environment. |
Keywords: satellite navigation interference spoofing timing receiver interference monitoring spoofing detection |
|
|
|
|
|