[go: up one dir, main page]

CN114910931A - Induced deception detection method based on weighted second-order central moment - Google Patents

Induced deception detection method based on weighted second-order central moment Download PDF

Info

Publication number
CN114910931A
CN114910931A CN202210074136.1A CN202210074136A CN114910931A CN 114910931 A CN114910931 A CN 114910931A CN 202210074136 A CN202210074136 A CN 202210074136A CN 114910931 A CN114910931 A CN 114910931A
Authority
CN
China
Prior art keywords
weighted
order central
detection
peak
spoofing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210074136.1A
Other languages
Chinese (zh)
Inventor
周玟龙
吕志伟
邓旭
柯晔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN202210074136.1A priority Critical patent/CN114910931A/en
Publication of CN114910931A publication Critical patent/CN114910931A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S19/00Satellite radio beacon positioning systems; Determining position, velocity or attitude using signals transmitted by such systems
    • G01S19/01Satellite radio beacon positioning systems transmitting time-stamped messages, e.g. GPS [Global Positioning System], GLONASS [Global Orbiting Navigation Satellite System] or GALILEO
    • G01S19/015Arrangements for jamming, spoofing or other methods of denial of service of such systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Radar, Positioning & Navigation (AREA)
  • Remote Sensing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Radar Systems Or Details Thereof (AREA)

Abstract

本发明提出一种基于加权二阶中心矩的诱导式欺骗检测方法,属于欺骗干扰检测技术领域。首先在接收机每个通道即时相关器左右等间距对称布置5对监视相关器,将对称布置的相关器分成左、右两组,分别根据每组中各相关器的输出值加权计算,得到左峰和右峰的加权二阶中心矩;然后对左峰与右峰的加权二阶中心矩作差;最后基于Neyman‑Pearson准则,将差值与检验阈值比较,精准判断是否存在欺骗干扰。本发明的多相关器输出值加权二阶中心矩设计,能够更好地衡量左峰与右峰之间的对称性,不仅检测效率更高,检测告警时间短,而且检测灵敏度高,在同等虚警率下,大大提高了检测概率,能够实现对欺骗信号的有效检测;同时对研究配备抗欺骗功能的GNSS接收机具有重大价值。

Figure 202210074136

The invention provides an induced spoofing detection method based on a weighted second-order central moment, which belongs to the technical field of spoofing interference detection. First of all, five pairs of monitoring correlators are symmetrically arranged at equal intervals on the left and right of the real-time correlator of each channel of the receiver, and the symmetrically arranged correlators are divided into two groups: left and right, and are calculated according to the output values of the correlators in each group. Then, the weighted second-order central moments of the left and right peaks are calculated; finally, based on the Neyman-Pearson criterion, the difference is compared with the test threshold to accurately determine whether there is cheating interference. The weighted second-order central moment design of the multi-correlator output value of the present invention can better measure the symmetry between the left peak and the right peak, and not only has higher detection efficiency, short detection and alarm time, but also high detection sensitivity. At low rate, the detection probability is greatly improved, and the effective detection of spoofing signals can be realized.

Figure 202210074136

Description

一种基于加权二阶中心矩的诱导式欺骗检测方法An Inductive Deception Detection Method Based on Weighted Second-Order Central Moments

技术领域technical field

本发明涉及一种基于加权二阶中心矩的诱导式欺骗检测方法,属于欺骗式干 扰检测技术领域。The invention relates to an inductive spoofing detection method based on a weighted second-order central moment, and belongs to the technical field of spoofing interference detection.

背景技术Background technique

GNSS欺骗干扰会导致受害接收机得到错误的位置、时间等,可能对导航安 全产生巨大威胁,为有效提高GNSS系统的可靠性,反欺骗技术是目前研究重点, 欺骗干扰检测是其中的关键技术之一。在接收机在受到欺骗攻击时,通过有效的 欺骗检测方法及时发现欺骗式干扰的存在和影响,并采取相应的抗欺骗措施,降 低甚至消除危害,这对于GNSS应用的安全性至关重要。GNSS spoofing and jamming will cause the victim receiver to obtain the wrong position, time, etc., which may pose a huge threat to navigation security. In order to effectively improve the reliability of the GNSS system, anti-spoofing technology is the current research focus, and spoofing jamming detection is one of the key technologies. one. When the receiver is attacked by spoofing, the existence and influence of spoofing interference can be detected in time through an effective spoofing detection method, and corresponding anti-spoofing measures can be taken to reduce or even eliminate the harm, which is very important for the security of GNSS applications.

诱导式欺骗通过逐渐调整功率、码速率等参数来接管受害接收机的跟踪环路, 使目标接收机平稳地偏离正确的位置或时间,会导致欺骗检测更加困难。虽然诱 导式欺骗干扰不会破坏目标接收机跟踪环路锁定,但是欺骗和真实信号的相互作 用而导致的相关峰对称性失真(畸变)是显著的,针对这一特点,许多研究人员 利用信号质量监测(SQM)来进行欺骗检测。SQM根据相关器输出值识别跟踪 输出中异常尖锐、平坦或不对称的相关峰,来检测GNSS信号出现的畸变和异常。 其中,Delta metric方法旨在检测相关峰的不对称性,而Ratio metric方法则专门 检测相关函数顶部是否存在“死区”;ELP metric(早期-晚期相位度量)方法利 用E和L相关器输出之间的相位差执行检测,也被确定为检测多径和欺骗的有 用鉴别器;Magnitude Difference Metric方法利用跟踪和监测早-晚相关器幅度之间差异来判断GNSS信号失真和多路径影响;还有通过码延迟域和多普勒频域实 施二维(2D)时频分析以提高欺骗检测性能和可靠性,但是此方法造成了额外的 计算复杂度;而后又有利用PD检测器进行欺骗检测,将异常接收功率检测和相 关峰失真检测组合构建了功率失真检测器,可以区分欺骗信号、多路径等;在此 基础上又提出了功率失真最大似然(PD-ML)检测器,与PD检测器直接比较, PD-ML检测器显示出更高的分辨精度,但是以额外的计算复杂性为代价实现了 这种改进的性能。Inductive spoofing takes over the tracking loop of the victim receiver by gradually adjusting parameters such as power and code rate, so that the target receiver deviates smoothly from the correct position or time, which makes spoofing detection more difficult. Although induced spoofing jamming does not destroy the target receiver tracking loop lock, the correlation peak symmetry distortion (distortion) caused by the interaction of spoofing and real signals is significant. Monitoring (SQM) for spoofing detection. SQM detects abnormally sharp, flat or asymmetric correlation peaks in the tracking output based on the correlator output value to detect distortions and anomalies in the GNSS signal. Among them, the Delta metric method is designed to detect the asymmetry of the correlation peak, and the Ratio metric method is designed to detect whether there is a "dead zone" at the top of the correlation function; the ELP metric (early-late phase metric) method uses the output of the E and L correlators. The Magnitude Difference Metric method uses tracking and monitoring of the difference between the early and late correlator amplitudes to determine GNSS signal distortion and multipath effects; and Two-dimensional (2D) time-frequency analysis is implemented in the code delay domain and Doppler frequency domain to improve the performance and reliability of spoofing detection, but this method causes additional computational complexity; then the PD detector is used for spoofing detection, A power distortion detector is constructed by combining abnormal received power detection and correlation peak distortion detection, which can distinguish spoofing signals, multipath, etc. In direct comparison with detectors, the PD-ML detector shows higher resolution accuracy, but achieves this improved performance at the cost of additional computational complexity.

以上基于SQM欺骗检测技术的核心在于利用Early、Prompt、Late同相或正 交相关器测量值与设定阈值比较,进而有效的监测由欺骗信号导致的相关峰的变 化。但是对于控制精度较高、欺骗过程缓慢且隐蔽的诱导欺骗,仅仅利用三个相 关器的输出结果鉴别相关峰的对称失真情况,其分辨率已难以满足要求。尤其在 欺骗信号出现初期,由于相关器较少,导致欺骗检测时间较长,且传统接收机并 没有考虑到相关器间隔,导致获取的相关峰曲线并不完整,因此对相关峰对称性 失真时并不敏感,导致检测概率下降;因此,需要构建更加合理精确的检验统计 量,从而对相关峰的对称性失真进行更精确的量化,才能更有效的检测出诱导式 欺骗。The core of the above SQM-based spoofing detection technology is to use the Early, Prompt, Late in-phase or quadrature correlator measurement values to compare with the set threshold, and then effectively monitor the change of the correlation peak caused by the spoofing signal. However, for the induced deception with high control precision, slow deception process and concealment, only using the output results of the three correlators to identify the symmetrical distortion of the correlation peak, its resolution is difficult to meet the requirements. Especially in the early stage of the emergence of spoofing signals, the spoofing detection time is long due to fewer correlators, and the traditional receiver does not consider the correlator interval, resulting in incomplete correlation peak curves obtained. Therefore, when the correlation peak symmetry is distorted, Therefore, it is necessary to construct a more reasonable and accurate test statistic, so as to quantify the symmetry distortion of the correlation peak more accurately, so as to detect the induced deception more effectively.

发明内容SUMMARY OF THE INVENTION

本发明的目的是提供一种基于加权二阶中心矩的诱导式欺骗检测方法,以提 高欺骗干扰的检测精度和效率。The purpose of the present invention is to provide an induced spoofing detection method based on the weighted second order central moment, so as to improve the detection accuracy and efficiency of spoofing interference.

本发明提供了一种基于加权二阶中心矩的诱导式欺骗检测方法,该方法包括 以下步骤:The present invention provides an induced deception detection method based on a weighted second-order central moment, the method comprising the following steps:

1)在接收机每个通道即时相关器左右对称布置至少3对相关器,获取每个 相关器的输出值;1) Arrange at least 3 pairs of correlators symmetrically on each channel of the receiver, and obtain the output value of each correlator;

2)将对称布置的相关器分成左、右两组,分别根据每组中各相关器的输出 值加权计算得到左峰的加权二阶中心矩和右峰的加权二阶中心矩,其中加权计算 时各相关器的权值由对应相关器相对于即时相关器的间隔和输出值的噪声方差 确定;2) The symmetrically arranged correlators are divided into left and right groups, and the weighted second-order central moment of the left peak and the weighted second-order central moment of the right peak are obtained according to the weighted calculation of the output value of each correlator in each group, wherein the weighted calculation The weight of each correlator is determined by the interval of the corresponding correlator relative to the immediate correlator and the noise variance of the output value;

3)将左峰加权二阶中心矩与右峰的加权二阶中心矩作差,得到左峰和右峰 的加权二阶中心矩差值,根据该差值函数的分布情况确定其均值和方差;3) Difference between the weighted second-order central moment of the left peak and the weighted second-order central moment of the right peak to obtain the difference between the weighted second-order central moment of the left peak and the right peak, and determine its mean and variance according to the distribution of the difference function ;

4)利用NP检测器对所述差值进行检测:设置一个虚警率,根据设置的虚 警率和所述均值、方差计算检验阈值,将得到的所述差值与检验阈值比较,判断 是否存在欺骗干扰;当所述差值与所述均值的差值的绝对值大于检验阈值时,则 判断存在欺骗干扰。4) utilize the NP detector to detect the difference: set a false alarm rate, calculate the inspection threshold according to the false alarm rate set and the mean value, variance, compare the obtained difference with the inspection threshold, and judge whether Deception interference exists; when the absolute value of the difference between the difference and the mean value is greater than the inspection threshold, it is determined that there is deception interference.

本发明在接收机上相对于即时相关器设置多对相关器,将其分成左右两组, 根据各相关器的输出值加权计算每组的二阶中心矩,考虑到了多相关器之间的关 系,优化相关器测量值的权重,通过加权求和得到检测分辨率更高的左峰加权二 阶中心矩和右峰加权二阶中心矩,并通过NP检测法对左峰和右峰的加权二阶中 心矩差值进行检测。本发明的多相关器输出值加权二阶中心矩设计,能够更好地 衡量左峰与右峰之间的对称性,不仅检测效率更高,检测告警时间短,而且检测 灵敏度高,在同等虚警率下,大大提高了检测概率,能够实现对欺骗信号的有效 检测。实际运用中,对研究配备抗欺骗功能的GNSS接收机具有重大价值。The present invention sets up multiple pairs of correlators on the receiver relative to the real-time correlators, divides them into left and right groups, and calculates the second-order central moments of each group by weighting according to the output values of the correlators, taking into account the relationship between the multiple correlators, Optimize the weight of the measured value of the correlator, obtain the left peak weighted second-order central moment and the right peak weighted second-order central moment with higher detection resolution through weighted summation, and use the NP detection method to calculate the weighted second-order central moment of the left and right peaks. The central moment difference is detected. The weighted second-order central moment design of the multi-correlator output value of the present invention can better measure the symmetry between the left peak and the right peak, not only has higher detection efficiency, shorter detection and alarm time, but also high detection sensitivity. The detection rate is greatly improved, and the effective detection of spoofing signals can be realized. In practical application, it is of great value to study GNSS receivers equipped with anti-spoofing function.

进一步地,相邻相关器为等间距设置。Further, adjacent correlators are arranged at equal intervals.

进一步地,所述相关器设置为5对,相邻相关器之间的间距为0.2码片。Further, the correlators are set to 5 pairs, and the distance between adjacent correlators is 0.2 chips.

通过上述等间距设置更多的相关器,可以得到更加充足的时域瞬态响应数据, 能够更好地评估接收机的相关峰的动态变化,实现相关峰对称性的精确量化,可 以得到更完整的相关曲线。By setting more correlators at equal intervals above, more sufficient time-domain transient response data can be obtained, which can better evaluate the dynamic changes of the receiver's correlation peak, and achieve accurate quantification of the symmetry of the correlation peak. the correlation curve.

进一步地,所述加权二阶中心矩的计算公式为:Further, the calculation formula of the weighted second-order central moment is:

Figure BDA0003483315080000031
Figure BDA0003483315080000031

式中,αi为第i个相关器的权值,i=1,2...n,n为相关器数量,

Figure BDA0003483315080000032
为第 i个相关器的同相支路(I)和正交支路(Q)的输出量的平方和,每个相关器都 包含I支路和Q支路。In the formula, α i is the weight of the ith correlator, i=1, 2...n, n is the number of correlators,
Figure BDA0003483315080000032
is the square sum of the outputs of the in-phase branch (I) and the quadrature branch (Q) of the ith correlator, and each correlator includes an I branch and a Q branch.

进一步地,所述相关器权值的计算公式为:Further, the calculation formula of the correlator weight is:

Figure BDA0003483315080000033
Figure BDA0003483315080000033

Figure BDA0003483315080000034
Figure BDA0003483315080000034

式中,di为第i个相关器距离对称中心的码片间距,

Figure BDA0003483315080000035
为I和Q通道的噪声 方差,k为离散时间。where d i is the chip spacing of the ith correlator from the center of symmetry,
Figure BDA0003483315080000035
is the noise variance of the I and Q channels, and k is the discrete time.

通过上述过程计算每组中每个相关器的权值,可以得到更精准的左峰和右峰 的加权二阶中心矩,能够更好地反映相关峰曲线的对称性。By calculating the weight of each correlator in each group through the above process, more accurate weighted second-order central moments of the left and right peaks can be obtained, which can better reflect the symmetry of the correlation peak curve.

进一步地,所述步骤3)在确定均值和方差时,需先确定左峰和右峰加权二 阶中心矩差值的特征函数,该特征函数由左峰加权二阶中心矩的特征函数和右峰 加权二阶中心矩的特征函数相乘得到,计算公式如下:Further, described step 3) when determining mean value and variance, need to determine the characteristic function of left peak and right peak weighted second-order central moment difference value first, and this characteristic function is composed of the characteristic function of left peak weighted second-order central moment and right The peak-weighted second-order central moment is multiplied by the characteristic functions, and the calculation formula is as follows:

Figure BDA0003483315080000041
Figure BDA0003483315080000041

式中,

Figure BDA0003483315080000042
为左峰加权二阶中心矩的特征函数,
Figure BDA0003483315080000043
为右峰加权 二阶中心矩的特征函数,δ为WSCM的非中心参数,n为每组相关器的个数。In the formula,
Figure BDA0003483315080000042
is the characteristic function of the weighted second-order central moment of the left peak,
Figure BDA0003483315080000043
is the characteristic function of the weighted second-order central moment of the right peak, δ is the non-centrality parameter of WSCM, and n is the number of correlators in each group.

通过建立左峰加权二阶中心矩的特征函数和右峰加权二阶中心矩的特征函 数,可以更方便、快速得到左峰和右峰加权二阶中心矩差值的均值和方差。By establishing the eigenfunction of the weighted second-order central moment of the left peak and the eigenfunction of the weighted second-order central moment of the right peak, the mean and variance of the difference between the weighted second-order central moment of the left peak and the right peak can be obtained more conveniently and quickly.

进一步地,所述差值方差的计算公式为:Further, the calculation formula of the difference variance is:

Figure BDA0003483315080000044
Figure BDA0003483315080000044

式中,Z=WSCME-L为左峰和右峰加权二阶中心矩差值,n为每组相关器个 数,

Figure BDA0003483315080000045
为左峰加权二阶中心矩的特征函数的二次求导,δ为WSCM的非中 心参数。In the formula, Z=WSCM EL is the weighted second-order central moment difference between the left peak and the right peak, n is the number of correlators in each group,
Figure BDA0003483315080000045
is the quadratic derivation of the characteristic function of the weighted second-order central moment of the left peak, and δ is the non-centrality parameter of WSCM.

进一步地,所述检验阈值的计算公式如下:Further, the calculation formula of the test threshold is as follows:

Figure BDA0003483315080000046
Figure BDA0003483315080000046

式中,γ为检验阈值,erfc-1是逆高斯函数,

Figure BDA0003483315080000047
为设置的虚警率,
Figure BDA0003483315080000048
为加 权二阶中心矩差值的方差。where γ is the test threshold, erfc -1 is the inverse Gaussian function,
Figure BDA0003483315080000047
is the set false alarm rate,
Figure BDA0003483315080000048
is the variance of the weighted second-order central moment difference.

附图说明Description of drawings

图1(a)是欺骗信号入侵前接收机相关峰的过程图;Figure 1(a) is a process diagram of the receiver correlation peak before the spoofing signal invades;

图1(b)是欺骗信号入侵前欺骗信号相关峰调整码速率逐渐接近真实信号 相关峰的过程图;Fig. 1(b) is a process diagram of the correlation peak adjustment code rate of the spoofing signal before the spoofing signal invades gradually approaching the real signal correlation peak;

图1(c)是欺骗信号入侵时欺骗信号与真实信号的码相位同步图;Figure 1(c) is the code phase synchronization diagram of the spoofed signal and the real signal when the spoofed signal invades;

图1(d)是欺骗信号入侵时增加欺骗信号的功率和码速率过程图;Figure 1(d) is a process diagram of increasing the power and code rate of the spoofing signal when the spoofing signal invades;

图1(e)是欺骗信号入侵时真实信号剥离图;Figure 1(e) is the real signal stripping diagram when the spoofed signal invades;

图1(f)是欺骗信号入侵后结果图;Figure 1(f) is the result after the intrusion of the spoofing signal;

图2是本发明欺骗干扰检测的具体流程图;Fig. 2 is the concrete flow chart of spoofing interference detection of the present invention;

图3(a)是传统接收机受到欺骗干扰时跟踪环路的相关器在相关函数上的 位置;Fig. 3(a) shows the position of the correlator of the tracking loop on the correlation function when the conventional receiver is interfered by spoofing;

图3(b)是本发明多相关器接收机在受到欺骗干扰时跟踪环路的相关器在 相关函数上的位置;Fig. 3 (b) is the position on the correlation function of the correlator of the tracking loop when the multi-correlator receiver of the present invention is interfered with by deception;

图4是本发明多相关器接收机DLL设计图;Fig. 4 is the multi-correlator receiver DLL design diagram of the present invention;

图5(a)是左峰的WSCM结果图;Figure 5(a) is the WSCM result diagram of the left peak;

图5(b)是左峰的直方图统计结果与理论概率密度函数对比图;Figure 5(b) is a comparison of the histogram statistical results of the left peak and the theoretical probability density function;

图5(c)是右峰的WSCM结果图;Figure 5(c) is the WSCM result of the right peak;

图5(d)是右峰的直方图统计结果与理论概率密度函数对比图;Figure 5(d) is a comparison between the histogram statistics of the right peak and the theoretical probability density function;

图6是WSCM在不同自由度下的仿真图;Figure 6 is a simulation diagram of WSCM under different degrees of freedom;

图7(a)是实验1中接收机跟踪环路的输出过程的三维图;Figure 7(a) is a three-dimensional diagram of the output process of the receiver tracking loop in Experiment 1;

图7(b)是实验1中接收机跟踪环路输出过程的俯视图;Figure 7(b) is a top view of the output process of the receiver tracking loop in Experiment 1;

图8(a)是实验1中Ratio Metric的检测量结果图;Figure 8(a) is a graph of the detection results of Ratio Metric in Experiment 1;

图8(b)是实验1中Detla Metric的检测量结果图;Figure 8(b) is a graph of the detection results of Delta Metric in Experiment 1;

图8(c)是实验1中ELP Metric的检测量结果图;Figure 8(c) is a graph of the detection results of ELP Metric in Experiment 1;

图8(d)是实验1中WSCM(E-L)的检测量结果图;Figure 8(d) is a graph of the detection amount of WSCM (E-L) in Experiment 1;

图9是实验1中三种传统SQM Metric和WSCM Metric检测性能的时域变化 对比图;Fig. 9 is the time domain change comparison chart of three kinds of traditional SQM Metric and WSCM Metric detection performance in experiment 1;

图10是实验1中三种传统SQM Metric和WSCM Metric的ROC曲线对比 图;Figure 10 is a comparison chart of the ROC curves of three traditional SQM Metrics and WSCM Metrics in Experiment 1;

图11(a)是实验2中接收机跟踪环路的输出过程的三维图;Figure 11(a) is a three-dimensional diagram of the output process of the receiver tracking loop in Experiment 2;

图11(b)是实验2中接收机跟踪环路输出过程的俯视图;Figure 11(b) is a top view of the output process of the receiver tracking loop in Experiment 2;

图12(a)是实验2中Ratio Metric的检测量结果图;Figure 12(a) is a graph of the detection results of Ratio Metric in Experiment 2;

图12(b)是实验2中Detla Metric的检测量结果图;Figure 12(b) is a graph of the detection results of Delta Metric in Experiment 2;

图12(c)是实验2中ELP Metric的检测量结果图;Figure 12(c) is a graph of the detection results of ELP Metric in Experiment 2;

图12(d)是实验2中WSCM(E-L)的检测量结果图;Figure 12(d) is a graph showing the detection amount of WSCM (E-L) in Experiment 2;

图13是实验2中三种传统SQM Metric和WSCM Metric检测性能的时域变 化对比图;Fig. 13 is the time domain change comparison chart of three kinds of traditional SQM Metric and WSCM Metric detection performance in experiment 2;

图14是实验2中三种传统SQM Metric和WSCM Metric的ROC曲线对比 图。Figure 14 is a comparison chart of the ROC curves of three traditional SQM Metrics and WSCM Metrics in Experiment 2.

具体实施方式Detailed ways

下面结合附图对本发明的具体实施方式作进一步地说明。The specific embodiments of the present invention will be further described below with reference to the accompanying drawings.

本发明旨在对诱导欺骗过程的相关峰的动态失真进行检测,对于多路径导致 的卫星相关器输出瞬时性变化可以忽略。由于诱导欺骗的码相位和功率调整更加 微妙,对于接收机来说,不会导致跟踪环路失锁,欺骗信号跟踪和剥离接收机相 关峰的过程如图1(a)-1(f)所示;在欺骗信号入侵前,从图1(a)-1(b)可 以看出,攻击者通过接收真实信号来估计目标接收器的天线相位中心和速度信息, 进而估计真实信号的载波频率和码相位,然后生成低功率、初始保持与真实信号 的载波频率相同但码相位初始相差超过2个码片的欺骗信号,然后通过调整码速 率逐渐接近真实信号。在欺骗信号入侵时,如图1(c)所示,欺骗信号在逐渐 与真实信号的码相位同步时,逐渐提高信号功率,但仍小于真实信号的功率,直 到欺骗信号到达目标接收机天线相位中心,并与真实信号的码相位对齐(误差小 于0.5个码片),此步为信号同步过程。此后(图1(d)-(e))增加欺骗信号的 功率和码速率,利用欺骗信号的功率优势使目标接收机剥离真实信号跟踪环路, 成功跟踪欺骗信号,此步为信号剥离过程。在欺骗信号入侵后,如图1(f)所示, 欺骗信号继续调整码速率拉离真实信号相关峰,直到欺骗信号大约比真实信号超 前两个码片,然后逐渐降低功率,完全实现对目标接收机的控制。The present invention aims to detect the dynamic distortion of the correlation peak which induces the spoofing process, and the instantaneous change of the satellite correlator output caused by the multi-path can be ignored. Since the code phase and power adjustment to induce spoofing is more subtle, for the receiver, it will not cause the tracking loop to lose lock. 1(a)-1(b), it can be seen from Figure 1(a)-1(b) that the attacker estimates the antenna phase center and velocity information of the target receiver by receiving the real signal, and then estimates the carrier frequency and code phase, and then generate a low-power spoofing signal that initially maintains the same carrier frequency as the real signal, but the code phase initially differs by more than 2 chips, and then gradually approaches the real signal by adjusting the code rate. When the spoofing signal invades, as shown in Figure 1(c), the spoofing signal gradually increases the signal power when it is gradually synchronized with the code phase of the real signal, but is still smaller than the power of the real signal, until the spoofing signal reaches the target receiver antenna phase Center, and align with the code phase of the real signal (error less than 0.5 chips), this step is the signal synchronization process. After that (Figure 1(d)-(e)), increase the power and code rate of the spoofing signal, and use the power advantage of the spoofing signal to make the target receiver strip the real signal tracking loop and successfully track the spoofing signal. This step is the signal stripping process. After the intrusion of the spoofed signal, as shown in Figure 1(f), the spoofed signal continues to adjust the code rate to pull away from the correlation peak of the real signal until the spoofed signal is about two chips ahead of the real signal, and then gradually reduces the power to completely achieve the target. control of the receiver.

从上述诱导式欺骗干扰的过程可以看出,欺骗信号在剥离真实信号相关峰的 过程中,会导致相关峰发生畸变,因此本发明以相关峰对称性为依据进行欺骗检 测,具体流程如图2所示,本发明首先在接收机每个通道即时相关器左右对称布 置至少3对相关器,获取每个相关器的输出值,得到各相关器的相关峰曲线;再 将对称布置的相关器分成左、右两组,分别根据每组中各相关器的相关峰曲线加 权计算每组的二阶中心矩,以分别得到左峰加权二阶中心矩和右峰的加权二阶中 心矩;然后对左峰加权二阶中心矩与右峰的加权二阶中心矩作差;最后将得到的 差值与检验阈值比较,判断是否存在欺骗干扰。It can be seen from the above process of inductive deception interference that the deception signal will cause the correlation peak to be distorted in the process of stripping the correlation peak of the real signal. Therefore, the present invention performs deception detection based on the symmetry of the correlation peak. The specific process is shown in Figure 2 As shown, the present invention firstly arranges at least 3 pairs of correlators symmetrically on each channel of the receiver, obtains the output value of each correlator, and obtains the correlation peak curve of each correlator; and then divides the symmetrically arranged correlators into For the left and right groups, the second-order central moments of each group are weighted according to the correlation peak curves of the correlators in each group, respectively, to obtain the weighted second-order central moments of the left peak and the weighted second-order central moments of the right peaks; The weighted second-order central moment of the left peak and the weighted second-order central moment of the right peak are compared; finally, the difference obtained is compared with the test threshold to determine whether there is cheating interference.

步骤1.相关器设置、获取相关峰曲线Step 1. Correlator settings and acquisition of correlation peak curves

本发明在接收机每个通道即时相关器左右都对称设置5对相关器,各相邻相 关器之间的距离相等,均为0.2码片,即对称设置的相关器与即时相关器的距离 分别为±0.2、±0.4、±0.6、±0.8、±1.0码片,获取接收机每个相关器的输出值, 并生成对应相关峰曲线。作为其他实施方式,相关器个数可以根据具体接收机硬 件和检测精度需求设定。In the present invention, 5 pairs of correlators are symmetrically arranged on the left and right sides of the immediate correlator of each channel of the receiver, and the distances between the adjacent correlators are equal, which are 0.2 chips, that is, the distances between the symmetrically arranged correlators and the immediate correlators are respectively For ±0.2, ±0.4, ±0.6, ±0.8, ±1.0 chips, obtain the output value of each correlator of the receiver, and generate the corresponding correlation peak curve. As other implementations, the number of correlators can be set according to specific receiver hardware and detection accuracy requirements.

图3(a)和图3(b)分别展示了传统接收机机和本发明设置5对相关器的 接收机在受到欺骗干扰时跟踪环路的相关器在相关函数上的位置,相比之下,图 3(b)中接收机使用更多的窄带和宽带相关器对,更能完整、迅速的反应相关峰 对称性失真情况。多对相关器接收机DLL的设计如图4所示,接收机通过射频 前端(RF Front End)将单天线(Antenna)接收到的射频(RF)信号转化为数 字中频(IF)信号,数字中频信号输入到接收机各个通道,经载波剥离后利用多 相关器进行非相干积分得到相关器的输出值;其中,跟踪阶段收到的混合GNSS 数字中频信号可以建模为对应于不同PRN的数字化信号的组合,分别含有真实 卫星信号、欺骗信号及噪声三部分,表示为:Fig. 3(a) and Fig. 3(b) respectively show the position of the correlator of the tracking loop on the correlation function of the traditional receiver machine and the receiver of the present invention with 5 pairs of correlators when they are interfered by spoofing, compared with Next, the receiver in Figure 3(b) uses more pairs of narrow-band and wide-band correlators, which can more completely and quickly respond to the symmetry distortion of the correlation peak. The design of the multi-pair correlator receiver DLL is shown in Figure 4. The receiver converts the radio frequency (RF) signal received by the single antenna (Antenna) into a digital intermediate frequency (IF) signal through the RF Front End (RF Front End). The signal is input to each channel of the receiver, and after carrier stripping, the multi-correlator is used for incoherent integration to obtain the output value of the correlator; among them, the mixed GNSS digital intermediate frequency signal received in the tracking stage can be modeled as a digitized signal corresponding to different PRNs The combination of , which contains three parts, the real satellite signal, the spoofing signal and the noise respectively, is expressed as:

Figure BDA0003483315080000071
Figure BDA0003483315080000071

式中,Ts是采样间隔,

Figure BDA0003483315080000072
分别是第m颗真实卫星信号的载波 相位、多普勒频率、功率、码延迟,
Figure BDA0003483315080000073
分别是第q颗真实卫星信号 的载波相位、多普勒频率、功率、码延迟,
Figure BDA0003483315080000074
Figure BDA0003483315080000075
分别表示 时刻nTs处设置的第m颗真实和第q颗欺骗信号相对应的PRN序列,η(nTs)是均 值为零、方差为σ2的加性高斯白噪声(AWGN),
Figure BDA0003483315080000076
Figure BDA0003483315080000077
分 别表示第m颗真实和第q颗欺骗PRN卫星信号的导航数据位,下标m和q分别 对应于第m和第q个接收到的真实和欺骗卫星的PRN信号。where T s is the sampling interval,
Figure BDA0003483315080000072
are the carrier phase, Doppler frequency, power, and code delay of the mth real satellite signal, respectively,
Figure BDA0003483315080000073
are the carrier phase, Doppler frequency, power, and code delay of the qth real satellite signal, respectively,
Figure BDA0003483315080000074
and
Figure BDA0003483315080000075
represent the PRN sequences corresponding to the m-th real and q-th spoofed signals set at time nT s , respectively, η(nT s ) is the additive white Gaussian noise (AWGN) with zero mean and variance σ 2 ,
Figure BDA0003483315080000076
and
Figure BDA0003483315080000077
represent the navigation data bits of the mth real and qth spoofed PRN satellite signals, respectively, and the subscripts m and q correspond to the mth and qth received PRN signals of the real and spoofed satellites, respectively.

在跟踪阶段接收机解扩时,GNSS接收机将接收信号与本地码副本相关,然 后执行低通滤波,相关器输出ul[k]表示为:During receiver despreading during the tracking phase, the GNSS receiver correlates the received signal with the local code replica and then performs low-pass filtering, the correlator output u l [k] is expressed as:

Figure BDA0003483315080000081
Figure BDA0003483315080000081

式中,N为相干积分间隔,k是相干积分次数,kNTs表示相关器输出的更新 时刻,

Figure BDA0003483315080000082
Figure BDA0003483315080000083
分别表示码延迟和多普勒频率估计。where N is the coherent integration interval, k is the number of coherent integrations, kNT s represents the update time of the correlator output,
Figure BDA0003483315080000082
and
Figure BDA0003483315080000083
are the code delay and Doppler frequency estimates, respectively.

假设接收机接收卫星PRN为l,非相干跟踪接收机将接收到的信号与多普勒 和码延迟接近真实信号的本地生成副本(

Figure BDA0003483315080000084
Figure BDA0003483315080000085
)相关联,当处于稳定跟踪状 态时,可以认为本地码和真实信号的载波频率和码延迟几乎相同(Δfl a,l≈0,
Figure BDA0003483315080000086
),由于相干积分时间通常为1ms,远小于数据码D的长度(20ms),因 此可以排除数据码D的影响。因此,相关器输出可大致表示为:Assuming that the receiver receives a satellite PRN of 1, the incoherent tracking receiver compares the received signal with a Doppler and code delay close to a locally generated copy of the true signal (
Figure BDA0003483315080000084
and
Figure BDA0003483315080000085
), when in a stable tracking state, it can be considered that the carrier frequency and code delay of the local code and the real signal are almost the same (Δf la ,l 0,
Figure BDA0003483315080000086
), since the coherent integration time is usually 1 ms, which is much smaller than the length of the data code D (20 ms), the influence of the data code D can be excluded. Therefore, the correlator output can be roughly expressed as:

Figure BDA0003483315080000087
Figure BDA0003483315080000087

式中,

Figure BDA0003483315080000088
分别表示第l个真实信号与本地信号码相位、载 波频率、初始载波相位之差,
Figure BDA0003483315080000089
分别表示第l个欺骗信号和真 实信号码相位、载波频率、初始载波相位之差,
Figure BDA00034833150800000810
表示真实信号或欺骗信号与 本地信号的互相关函数,
Figure BDA00034833150800000811
表示第l个相关器分支输出的方差为σ2的低通 滤波加性高斯噪声分量,由具有近似零均值高斯同相(I)和正交相位(Q)分量 的噪声和残余互相关项组成。In the formula,
Figure BDA0003483315080000088
Represent the difference between the lth real signal and the local signal code phase, carrier frequency, and initial carrier phase, respectively,
Figure BDA0003483315080000089
represent the difference between the code phase, carrier frequency, and initial carrier phase of the lth spoofed signal and the real signal, respectively,
Figure BDA00034833150800000810
represents the cross-correlation function of the real or spoofed signal and the local signal,
Figure BDA00034833150800000811
represents the low-pass filtered additive Gaussian noise component of variance σ2 at the output of the lth correlator branch, consisting of noise and residual cross-correlation terms with approximately zero-mean Gaussian in-phase (I) and quadrature-phase (Q) components.

对于GPS L1 C/A信号,经过相干积分后,本地信号和真实信号测距码的归 一化互相关函数表示为:For the GPS L1 C/A signal, after coherent integration, the normalized cross-correlation function of the local signal and the real signal ranging code is expressed as:

Figure BDA00034833150800000812
Figure BDA00034833150800000812

Tc表示码片持续时间,理论上,当欺骗信号与真实信号之间的码相位差大于 2个码片时,两个测距码的相关峰值不会重叠,并且欺骗信号不会影响真实信号, 此时码域相关器输出(假设频率偏移Δfl a,L为常数)为宽度2Tc、以码偏移为零对 称的三角函数。假设欺骗信号初始落后于真实信号的码相位为2个码片,经相干 积分后,欺骗信号和真实信号测距码归一化互相关函数可以表示为:T c represents the chip duration. In theory, when the code phase difference between the spoofed signal and the real signal is greater than 2 chips, the correlation peaks of the two ranging codes will not overlap, and the spoofed signal will not affect the real signal. , at this time the output of the code domain correlator (assuming that the frequency offset Δf la , L is a constant) is a trigonometric function with a width of 2T c and symmetric with a code offset of zero. Assuming that the code phase of the spoofed signal initially lags behind the real signal by 2 chips, after coherent integration, the normalized cross-correlation function of the ranging code between the spoofed signal and the real signal can be expressed as:

Figure BDA0003483315080000091
Figure BDA0003483315080000091

式中,

Figure BDA0003483315080000092
表示欺骗信号和真实信号之间码速率的差值。为简单起见,假 设欺骗信号和真实信号的多普勒频率相同,此时载波相位偏移近似为0或者一个 常数。然后,相关器输出的同相分量和正交分量可以建模为:In the formula,
Figure BDA0003483315080000092
Represents the difference in code rate between the spoofed signal and the real signal. For simplicity, it is assumed that the Doppler frequency of the spoofed signal and the real signal are the same, and the carrier phase offset is approximately 0 or a constant at this time. Then, the in-phase and quadrature components of the correlator output can be modeled as:

Figure BDA0003483315080000093
Figure BDA0003483315080000093

式中,ηI[kNTs]和ηQ[kNTs]是每个通道的高斯白噪声,当欺骗信号不存在时, 忽略多普勒频移误差,且ηI[kNTs]和ηQ[kNTs]不相关,Il和Ql理论上服从高斯分 布,可表示为:where η I [kNT s ] and η Q [kNT s ] are white Gaussian noise for each channel, when the spoofing signal does not exist, the Doppler shift error is ignored, and η I [kNT s ] and η Q [kNT s ] is irrelevant, I l and Q l obey a Gaussian distribution theoretically, which can be expressed as:

Figure BDA0003483315080000094
Figure BDA0003483315080000094

式中,μI

Figure BDA0003483315080000095
μQ
Figure BDA0003483315080000096
分别表示同相和正交相关器输出的均值和方差, 并且假设I-Q相关器的协方差σIQ为零。
Figure BDA0003483315080000097
是后相关噪声的基本方差,N0是噪 声功率谱密度,C/N0是接收信号的载噪比。由式(7)可知,当接收机在非相 干模式下工作,欺骗信号对跟踪环路实施诱导式欺骗时,应同时考虑对同相和正 交分量分支的影响。In the formula, μ I ,
Figure BDA0003483315080000095
μ Q ,
Figure BDA0003483315080000096
represent the mean and variance of the in-phase and quadrature correlator outputs, respectively, and assume that the covariance σ IQ of the IQ correlator is zero.
Figure BDA0003483315080000097
is the basic variance of the post-correlation noise, N 0 is the noise power spectral density, and C/N 0 is the carrier-to-noise ratio of the received signal. It can be known from equation (7) that when the receiver works in the non-coherent mode and the spoofing signal implements inductive spoofing on the tracking loop, the influence on the in-phase and quadrature component branches should be considered at the same time.

根据相关器输出值,生成对应相关峰曲线,相关峰曲线的形状可直接反应信 号的畸变、多路径效应、带限失真和干扰等对卫星导航信号的影响,本发明主要 考虑欺骗干扰造成的影响。According to the output value of the correlator, the corresponding correlation peak curve is generated. The shape of the correlation peak curve can directly reflect the influence of signal distortion, multipath effect, band-limited distortion and interference on the satellite navigation signal. The present invention mainly considers the influence caused by deception interference. .

步骤2.左峰、右峰的加权二阶中心矩Step 2. Weighted second order central moments of left and right peaks

本发明利用波形二阶中心矩特性,分析相关峰的变化。将对称布置的相关器 分成左、右两组,分别根据每组中各相关器的相关峰值加权计算,以分别得到左 峰加权二阶中心矩和右峰的加权二阶中心矩。具体计算过程如下:The invention utilizes the second-order central moment characteristic of the waveform to analyze the variation of the correlation peak. The symmetrically arranged correlators are divided into two groups, left and right, and the weighted calculation is performed according to the correlation peak value of each correlator in each group to obtain the weighted second-order central moment of the left peak and the weighted second-order central moment of the right peak respectively. The specific calculation process is as follows:

假设归一化后一个周期内的相关峰函数为y=f(x),相关峰横轴采样点位xi, 单位取1码片,相关峰纵向幅度为yi。对于归一化后的相关曲线在理想状态下yi的取值最大为1,相关峰最高点的横坐标为x0=0,则二阶中心矩的计算公式为:It is assumed that the correlation peak function in one cycle after normalization is y=f(x), the horizontal axis sampling point of the correlation peak is x i , the unit is 1 chip, and the vertical amplitude of the correlation peak is yi . For the normalized correlation curve, in the ideal state, the maximum value of y i is 1, and the abscissa of the highest point of the correlation peak is x 0 =0, then the calculation formula of the second-order central moment is:

Figure BDA0003483315080000101
Figure BDA0003483315080000101

对于非相干积分,若非相干积分数目为Nnc,则检测量

Figure BDA0003483315080000102
的值为For incoherent integration, if the number of incoherent integrations is N nc , then the detection
Figure BDA0003483315080000102
value of

Figure BDA0003483315080000103
Figure BDA0003483315080000103

式中,di表示相关器距离对称中心的码片间距,因此二阶中心矩(SCM Metric) 表达式为:In the formula, d i represents the chip spacing of the correlator from the center of symmetry, so the second-order central moment (SCM Metric) expression is:

Figure BDA0003483315080000104
Figure BDA0003483315080000104

式中d0=0,表示相关峰最高点。In the formula, d 0 =0, representing the highest point of the correlation peak.

根据式(7)可知,

Figure BDA0003483315080000105
且I-Q相关器的协 方差σIQ为零。令
Figure BDA0003483315080000106
本发明设置5对相关器, 所以i=1、2…5,则有:According to formula (7), it can be known that
Figure BDA0003483315080000105
And the covariance σ IQ of the IQ correlator is zero. make
Figure BDA0003483315080000106
The present invention sets 5 pairs of correlators, so i=1, 2...5, then there are:

Figure BDA0003483315080000111
Figure BDA0003483315080000111

式中,V0为协方差阵,因此,

Figure BDA0003483315080000112
μ≠0且
Figure BDA0003483315080000113
令Y=AX+b, 其中b为常数矩阵,系数矩阵A为2n阶可逆方阵,其表达式为:In the formula, V 0 is the covariance matrix, therefore,
Figure BDA0003483315080000112
μ≠0 and
Figure BDA0003483315080000113
Let Y=AX+b, where b is a constant matrix, and the coefficient matrix A is an invertible square matrix of order 2n, and its expression is:

Figure BDA0003483315080000114
Figure BDA0003483315080000114

协方差矩阵V表示为:The covariance matrix V is expressed as:

Figure BDA0003483315080000115
Figure BDA0003483315080000115

则随机变量(可视为经线性变换后的随机变量的二次型),

Figure BDA0003483315080000116
其中非中心参数δ=(Aμ+b)T(AVAT)-1(Aμ+b)。Then the random variable (can be regarded as the quadratic form of the random variable after linear transformation),
Figure BDA0003483315080000116
where the non-centrality parameter δ=(Aμ+b) T (AVA T ) -1 (Aμ+b).

δ的具体计算过程如下:因为

Figure BDA0003483315080000117
所以E(AX+b)=AEX+b=Aμ+b, D(AX+b)=D(AX)=AD(X)AT=AVAT,故随机向量
Figure BDA0003483315080000118
因为V>0,由正定矩阵分解可知V=CCT(C为可逆方阵),故The specific calculation process of δ is as follows: because
Figure BDA0003483315080000117
So E(AX+b)=AEX+b=Aμ+b, D(AX+b)=D(AX)=AD(X)A T =AVA T , so the random vector
Figure BDA0003483315080000118
Because V>0, it can be known from the positive definite matrix decomposition that V=CC T (C is an invertible square matrix), so

AVAT=ACCTAT=AC(AC)T (14)AVA T =ACC T A T =AC(AC) T (14)

由A与C可逆知,AC可逆,令Y=(AC)-1(AX+b),即AX+b=(AC)Y,由It can be known that A and C are reversible, AC is reversible, let Y=(AC) -1 (AX+b), that is, AX+b=(AC)Y, by

EY=E[(AC)-1(AX+b)]=(AC)-1(Aμ+b) (15)EY=E[(AC) -1 (AX+b)]=(AC) -1 (Aμ+b) (15)

Figure BDA0003483315080000121
Figure BDA0003483315080000121

证得certified

Figure BDA0003483315080000122
Figure BDA0003483315080000122

则有then there are

Figure BDA0003483315080000123
Figure BDA0003483315080000123

根据定义,非中心参数为By definition, the non-centrality parameter is

Figure BDA0003483315080000124
Figure BDA0003483315080000124

取常数向量b=0,则实际中二阶中心矩的表达式为:Taking the constant vector b=0, the actual expression of the second-order central moment is:

Figure BDA0003483315080000125
Figure BDA0003483315080000125

Figure BDA0003483315080000126
对应于相关器间隔为di的同相和正交支路的输出量的平方和,其系数 表示为
Figure BDA0003483315080000127
为了更科学的构建检验统计指标,需要对其系 数进行加权处理,加权后系数各相关器权值αi满足公式(21):
Figure BDA0003483315080000126
The sum of the squares of the outputs of the in-phase and quadrature branches corresponding to the correlator interval d i , whose coefficients are expressed as
Figure BDA0003483315080000127
In order to construct the test statistics more scientifically, the coefficients need to be weighted, and the weights α i of each correlator of the coefficients satisfy formula (21):

Figure BDA0003483315080000131
Figure BDA0003483315080000131

综合式(20),得到左峰、右峰的加权二阶中心矩的表达式如下:Combining formula (20), the expressions of the weighted second-order central moments of the left and right peaks are obtained as follows:

Figure BDA0003483315080000132
Figure BDA0003483315080000132

由以上分析可知,

Figure BDA0003483315080000133
其非中心参数δ满足:From the above analysis, it can be seen that
Figure BDA0003483315080000133
Its non-centrality parameter δ satisfies:

Figure BDA0003483315080000134
Figure BDA0003483315080000134

公式(22)中相关峰的加权二阶中心矩满足非中心卡方分布,如图5(a)-5 (d)所示,从图中可以看出,当不存在欺骗信号时,左右峰的WSCM均近似服 从非中心卡方分布,且左右峰WSCM的PDF近似一致,这与以上理论证明保持 一致,论证了理论分析的合理性和正确性。The weighted second-order central moment of the correlation peak in formula (22) satisfies the non-central chi-square distribution, as shown in Fig. 5(a)-5(d). It can be seen from the figure that when there is no deception signal, the left and right peaks The WSCMs of all approximately obey the non-central chi-square distribution, and the PDFs of the WSCMs of the left and right peaks are approximately consistent, which is consistent with the above theoretical proof, demonstrating the rationality and correctness of the theoretical analysis.

步骤3.左峰和右峰加权二阶中心矩求差Step 3. Difference between left and right peak weighted second order central moments

为了更好的衡量相关峰的对称性,需要将接收机相关函数的左峰的加权二阶 中心矩WSCME和右峰的加权二阶中心矩WSCML作差,记为WSCME-L。由上 述可知,多相关器在相关函数上呈对称分布时,WSCME和WSCML同样服从 χ(2n,δ),需要进一步确定WSCME-L的分布。In order to better measure the symmetry of the correlation peak, it is necessary to make the difference between the weighted second-order central moment WSCM E of the left peak of the receiver correlation function and the weighted second-order central moment WSCM L of the right peak, and record it as WSCM EL . It can be seen from the above that when the multi-correlator is symmetrically distributed on the correlation function, WSCM E and WSCM L also obey χ(2n, δ), and the distribution of WSCM EL needs to be further determined.

由特征函数的性质可知,当

Figure BDA0003483315080000135
其特征函数为:From the properties of the characteristic function, it can be seen that when
Figure BDA0003483315080000135
Its characteristic function is:

Figure BDA0003483315080000136
Figure BDA0003483315080000136

WSCME和WSCML相互独立,因此WSCME-L的特征函数可以表示为:WSCM E and WSCM L are independent of each other, so the characteristic function of WSCM EL can be expressed as:

Figure BDA0003483315080000141
Figure BDA0003483315080000141

本发明设置5对相关器,则n取值为5,根据中心极限定理,当n趋于无限 大时,非中心卡方分布趋于高斯分布。当n等于5,即自由度等于10时,本实 例得到的非中心卡方分布仿真图如图6所示,从图6中可以看出当自由度越大时, WSCM越近似服从高斯分布,这与中心极限定理相吻合。The present invention sets 5 pairs of correlators, then n takes a value of 5. According to the central limit theorem, when n tends to be infinite, the non-central chi-square distribution tends to Gaussian distribution. When n is equal to 5, that is, the degree of freedom is equal to 10, the simulation diagram of the non-central chi-square distribution obtained in this example is shown in Figure 6. It can be seen from Figure 6 that when the degree of freedom is larger, the WSCM more approximately obeys the Gaussian distribution, This is consistent with the Central Limit Theorem.

因此,可以近似认为

Figure BDA0003483315080000142
根据特征函数与k阶原 点矩的关系可知,Therefore, it can be approximated that
Figure BDA0003483315080000142
According to the relationship between the characteristic function and the k-order origin moment, it can be known that,

Figure BDA0003483315080000143
Figure BDA0003483315080000143

由于,because,

Figure BDA0003483315080000144
Figure BDA0003483315080000144

所以方差为:So the variance is:

Figure BDA0003483315080000145
Figure BDA0003483315080000145

由以上可知,当不存在欺骗干扰时,通过计算左右峰加权二阶中心矩,通过 作差可以得到欺骗检测统计量—WSCM Metric,差值服从均值为0,方差为 8n+8δ的高斯分布。当欺骗者实施欺骗时,由于相关函数左右峰不再对称,可 认为WSCM Metric不再服从高斯分布,利用此性质可以对欺骗信号实施有效的 检测,排除威胁。It can be seen from the above that when there is no spoofing interference, the spoofing detection statistic—WSCM Metric can be obtained by calculating the weighted second-order central moments of the left and right peaks, and the difference follows a Gaussian distribution with a mean of 0 and a variance of 8n+8δ. When the deceiver implements deception, since the left and right peaks of the correlation function are no longer symmetrical, it can be considered that the WSCM Metric no longer obeys the Gaussian distribution. Using this property, the deception signal can be effectively detected and threats can be eliminated.

步骤4.欺骗检测Step 4. Spoofing Detection

诱导式欺骗检测实际上是一个二元假设检验问题,本发明利用 Neyman-Pearson(NP)检测器,考虑两个假设:零假设,H0,无欺骗信号存在; 备选假设,H1,有欺骗信号存在。根据上式推导可知,检验度量

Figure BDA0003483315080000146
因此二元假设检验可以表示为:Inductive spoofing detection is actually a binary hypothesis testing problem. The present invention uses the Neyman-Pearson (NP) detector to consider two hypotheses: the null hypothesis, H 0 , there is no spoofing signal; the alternative hypothesis, H 1 , has Spoofing signals exist. According to the derivation of the above formula, it can be seen that the test metric
Figure BDA0003483315080000146
So the binary hypothesis test can be expressed as:

Figure BDA0003483315080000151
Figure BDA0003483315080000151

式中Zt表示左峰和右峰的加权二阶中心矩偏差值,μE-L为其均值,根据上 述公式(26)得到μE-L等于0。In the formula, Z t represents the weighted second-order central moment deviation value of the left peak and the right peak, and μ EL is the mean value. According to the above formula (26), μ EL is equal to 0.

为了在缺乏完全定义的备选假设分布的情况下构建NP检测器,结合式(29), 似然函数可以定义为:To construct an NP detector in the absence of a fully defined distribution of alternative hypotheses, combined with Eq. (29), the likelihood function can be defined as:

L(Zt)=|ZtE-L| (30)L(Z t )=|Z tEL | (30)

使用似然函数,检验阈值γ的虚警率可通过以下公式计算:Using the likelihood function, the false alarm rate for the test threshold γ can be calculated by the following formula:

Figure BDA0003483315080000152
Figure BDA0003483315080000152

式(35)中γ为检测欺骗是否存在的合理阈值,虚警率

Figure BDA0003483315080000153
是指存在欺骗攻 击的假设被接受但事实上不存在的概率。通常,用于计算的检验阈值是指定
Figure BDA0003483315080000154
和 热噪声水平的函数。对于指定的热噪声C/N0,最终
Figure BDA0003483315080000155
也可视为检验阈值的函数, 即在热噪声为定值时,检验阈值和虚警率
Figure BDA0003483315080000156
相关,通过虚警率确定检验阈值。In formula (35), γ is a reasonable threshold for detecting the existence of cheating, and the false alarm rate
Figure BDA0003483315080000153
It refers to the probability that the hypothesis that there is a spoofing attack is accepted but in fact does not exist. Typically, the test threshold used for the calculation is specified
Figure BDA0003483315080000154
and a function of thermal noise level. For a specified thermal noise C/N 0 , the final
Figure BDA0003483315080000155
It can also be regarded as a function of the test threshold, that is, when the thermal noise is a constant value, the test threshold and the false alarm rate are
Figure BDA0003483315080000156
Correlation, the detection threshold is determined by the false alarm rate.

如果给定

Figure BDA0003483315080000157
则可通过概率函数求逆来确定检验阈值γ。由于在没有欺骗 的情况下左右峰加权二阶中心矩之差服从高斯分布,因此检验阈值γ可以从下式 得到:if given
Figure BDA0003483315080000157
The test threshold γ can then be determined by inverting the probability function. Since the difference between the weighted second-order central moments of the left and right peaks follows a Gaussian distribution without cheating, the test threshold γ can be obtained from:

Figure BDA0003483315080000158
Figure BDA0003483315080000158

其中erfc-1是逆高斯函数。结合式(7)、式(28)和式(32),可以看出检验阈值γ与载噪比C/N0密切相关,如果C/N0越高,则方差

Figure BDA0003483315080000159
越小,因此这个检验阈值 越接近平均值μE-L。较高的信噪比意味着导航信号受到的干扰较小,跟踪回路 可以更好地工作,并以更高的精度获得测量结果。实时计算的WSCM测试值更 可能聚集在某个常数μE-L附近,这意味着这些值的方差较小。除非发生中间欺 骗或其他干扰,否则WSCM测试值离μE-L太远的概率会非常低。where erfc -1 is the inverse Gaussian function. Combining equations (7), (28) and (32), it can be seen that the test threshold γ is closely related to the carrier-to-noise ratio C/N 0 . If the C/N 0 is higher, the variance
Figure BDA0003483315080000159
The smaller, therefore, the closer this test threshold is to the mean μ EL . A higher signal-to-noise ratio means that the navigation signal is less disturbed, the tracking loop can work better, and measurements can be obtained with greater accuracy. The WSCM test values computed in real time are more likely to cluster around some constant μEL , which means that these values have less variance. Unless intermediate spoofing or other interference occurs, the probability that the WSCM test value is too far from μEL will be very low.

检测概率(Pd)或检测率可通过以下公式进行理论计算:The detection probability (P d ) or detection rate can be theoretically calculated by the following formula:

Pd=ρ(|ZtE-L|>γ|H1) (33)P d =ρ(|Z tEL |>γ|H 1 ) (33)

检测概率(Pd)是指不存在欺骗攻击的假设被接受且事实上存在的概率, 理论上计算Pd时,首先要知道在欺骗状态下检测度量的概率分布。但是,由于 其分布取决于欺骗攻击的模式,而且欺骗具有时变特性,接收机并不知道欺骗信 号的功率和码相位如何变化,况且在频率锁定的模式下,载波相位差也可能存在 误差,目标接收机不可能预测欺骗者的行为,以上这些因素导致欺骗环境下 WSCM分布非常复杂,推导其PDF解析式是不切实际的,常使用统计方法代替 Pd来计算所提出方法的检测率。此时Pd的表达式如下所示The detection probability (P d ) refers to the probability that the hypothesis that there is no spoofing attack is accepted and actually exists. When calculating P d theoretically, the probability distribution of the detection metric in the spoofing state must be known first. However, since its distribution depends on the mode of the spoofing attack, and the spoofing has time-varying characteristics, the receiver does not know how the power and code phase of the spoofed signal change, and in the frequency-locked mode, the carrier phase difference may also have errors. It is impossible for the target receiver to predict the behavior of the spoofer. These factors make the WSCM distribution very complex in the spoofing environment, and it is impractical to derive its PDF analytic formula. Statistical methods are often used instead of P d to calculate the detection rate of the proposed method. At this time, the expression of P d is as follows

Figure BDA0003483315080000161
Figure BDA0003483315080000161

此时Pd定义为在欺骗信号存在情况下超过阈值γ的样本数量与样本总数的 比值。为了获得Pd,首先使用式(32)计算给定

Figure BDA0003483315080000162
处的阈值γ,然后,在每个 检测窗口内执行欺骗检测。At this time, P d is defined as the ratio of the number of samples exceeding the threshold γ to the total number of samples in the presence of a spoofing signal. To obtain P d , first use equation (32) to calculate given
Figure BDA0003483315080000162
Then, spoofing detection is performed within each detection window.

综上,欺骗检测最终判定依据为:To sum up, the final judgment of deception detection is based on:

Figure BDA0003483315080000163
Figure BDA0003483315080000163

将左峰与右峰加权二阶中心矩的差值Zt与求解得到的左峰与右峰加权二阶 中心矩差值的均值作差,得到的差值的绝对值大于检验阈值时,判断存在欺骗干 扰;否则,判定不存在欺骗干扰。The difference Z t between the weighted second-order central moments of the left peak and the right peak and the mean value of the weighted second-order central moments of the left and right peaks obtained by solving the difference, when the absolute value of the obtained difference is greater than the test threshold, judge Deception jamming exists; otherwise, it is determined that deception jamming does not exist.

为了进一步说明本发明方法在欺骗干扰检测中的可靠性和实用性,通过对TEXBAT数据库中两种不同欺骗模式的数据进行检测,其中一种是小功率位置欺 骗攻击;另一种是无缝接管攻击,具体是指欺骗信号与载波信号之间的载波相位 对齐,是更为精细的欺骗攻击。In order to further illustrate the reliability and practicability of the method of the present invention in the detection of spoofing interference, the data of two different spoofing modes in the TEXBAT database are detected, one of which is a low-power location spoofing attack; the other is a seamless takeover. The attack, which specifically refers to the carrier phase alignment between the spoofing signal and the carrier signal, is a more sophisticated spoofing attack.

实验1:小功率欺骗攻击检测Experiment 1: Low Power Spoofing Attack Detection

该实验为了完整展现欺骗实施过程,通过改进GNSS SDR得到通道多个相 关器下接收机相关函数的瞬时响应,以PRN6号卫星为例,具体输出结果如图7 (a)-7(b)。从图7(a)和7(b)可以看出,欺骗信号大约在100秒以后对以 频率锁定的模式侵入和剥离真实信号,300秒左右后跟踪环路完全锁定欺骗信号, 且距离真实信号相关峰大于一个码片左右。在此过程中,欺骗信号保持0.4dB 的低功率优势,同时尽量保持与真实信号恒定的载波相位偏移,需要注意的是码 相位和载波相位的变化率并不保持恒定的比例,但是相对码相位偏移相对于恒定 的载波相位偏移而移动。这种交互作用会导致相关峰对称性发生失真,其俯视图 (图7(b))突出显示了欺骗过程中在临界时间发生较大波动问题,此类波动主 要是由于欺骗信号对真实信号的频率锁定不够精确,导致I和Q支路能量彼此慢 慢切换,从而导致功率泄露。In this experiment, in order to fully demonstrate the spoofing implementation process, the instantaneous response of the receiver correlation function under multiple correlators in the channel is obtained by improving the GNSS SDR. Taking the PRN6 satellite as an example, the specific output results are shown in Figure 7(a)-7(b). It can be seen from Figures 7(a) and 7(b) that the spoofing signal invades and strips the real signal in the frequency-locked mode after about 100 seconds, and the tracking loop completely locks the spoofing signal after about 300 seconds, and the distance from the real signal is The correlation peak is larger than about one chip. In this process, the spoofed signal maintains a low power advantage of 0.4dB, while trying to maintain a constant carrier phase offset from the real signal. It should be noted that the rate of change of the code phase and the carrier phase does not maintain a constant ratio, but the relative The phase offset moves relative to a constant carrier phase offset. This interaction distorts the symmetry of the correlation peak, and its top view (Fig. 7(b)) highlights the problem of large fluctuations at critical times during the spoofing process. Such fluctuations are mainly due to the frequency of the spoofed signal versus the true signal. The locking is not precise enough, causing the I and Q branch energies to slowly switch to each other, resulting in power leakage.

实验1采用传统的SQM Metric(Ratio Metric、Detla Metric、ELP Metric) 和WSCM Metric进行欺骗检测,得到结果如图8(a)-8(d)所示,图8(a)-8 (d)显示出传统SQMMetric和WSCM Metric在欺骗实施过程中时域瞬时响应, 并给出了对应与恒定虚警率10%的检验阈值。大约100秒以前,在未实施欺骗信 号时度量值并未发生明显的趋势性变化,100秒后,欺骗信号和真实信号的相互 作用导致混合信号的相关函数发生失真,度量值会发生显著变化,尤其体现在 110秒至250秒之间,250秒以后度量值保持稳定,这是因为跟踪环路完全锁定 欺骗信号。因此,利用这种交互阶段导致的显著度量值变化可以用来检测欺骗信 号是否存在。而相比于传统SQM Metric,WSCM Metric在110秒至150秒左右 和250秒以后左右时间发生较为显著的变化(超过了检验阈值),说明WSCM Metric能更好的感应到频率锁定不精确导致的SQM微小震荡。可以看出,在同 等虚警率下,本发明方法能很好地检测到一些微小震荡。Experiment 1 uses traditional SQM Metric (Ratio Metric, Detla Metric, ELP Metric) and WSCM Metric for deception detection, and the results are shown in Figures 8(a)-8(d), and Figures 8(a)-8(d) The time-domain instantaneous responses of traditional SQMMetric and WSCM Metric in the process of deception implementation are shown, and the inspection threshold corresponding to a constant false alarm rate of 10% is given. About 100 seconds ago, when the spoof signal was not implemented, the metric value did not change significantly. After 100 seconds, the interaction of the spoof signal and the real signal caused the correlation function of the mixed signal to be distorted, and the metric value changed significantly. In particular, between 110 seconds and 250 seconds, the metric remains stable after 250 seconds, because the tracking loop is completely locked to the spoofing signal. Therefore, significant metric changes resulting from this interaction phase can be used to detect the presence of spoofing signals. Compared with the traditional SQM Metric, the WSCM Metric changes significantly in about 110 seconds to 150 seconds and after 250 seconds (exceeding the inspection threshold), which means that the WSCM Metric can better sense the inaccurate frequency locking. SQM oscillates slightly. It can be seen that under the same false alarm rate, the method of the present invention can detect some small oscillations well.

进一步,图9展示了在同等虚警率下,传统SQM Metric和WSCM Metric 检测性能的时域变化,其中检测概率每10秒测试统计一次。可以看出,0到100 秒时间内未发生欺骗干扰,四种度量指标的检测概率大约都为10%,这与设定的 10%恒定虚警率相吻合。100秒至250秒欺骗攻击阶段,基于WSCM Metric欺骗 检测技术的检测性能明显优于传统SQMMetric技术,大部分能达到80%至100%, 而传统的SQM Metric检测概率大部分在80%以下,此外,相比于传统SQM Metric, WSCM Metric指标在120秒时检测概率达到79.8%,而传统SQM Metric大约在 150秒检测概率才能达到40%以上,预警时间提前了30秒左右。最后在250秒 以后,传统SQM Metric快接近降到稳定虚警率水平以上10%至20%,但是基于WSCM Metric检测概率仍能达到98%以上。因此,基于WSCM Metric欺骗检 测技术不仅能缩短反应时间,而且能提高检测概率,有助于更迅速更精确的在有 欺骗信号存在的情况下发出警报。Further, Figure 9 shows the time domain changes of the detection performance of the traditional SQM Metric and WSCM Metric under the same false alarm rate, where the detection probability is tested and counted every 10 seconds. It can be seen that there is no spoofing interference from 0 to 100 seconds, and the detection probability of the four metrics is about 10%, which is consistent with the set constant false alarm rate of 10%. In the spoofing attack stage from 100 seconds to 250 seconds, the detection performance based on the WSCM Metric spoofing detection technology is significantly better than the traditional SQMMetric technology, most of which can reach 80% to 100%, while the traditional SQM Metric detection probability is mostly below 80%. , Compared with the traditional SQM Metric, the detection probability of the WSCM Metric indicator reaches 79.8% at 120 seconds, while the detection probability of the traditional SQM Metric can reach more than 40% in about 150 seconds, and the early warning time is about 30 seconds earlier. Finally, after 250 seconds, the traditional SQM Metric is about to drop to 10% to 20% above the stable false alarm rate level, but the detection probability based on WSCM Metric can still reach more than 98%. Therefore, the spoofing detection technology based on WSCM Metric can not only shorten the response time, but also improve the detection probability, which is helpful to issue an alarm more quickly and accurately in the presence of spoofing signals.

为了更好更全面的评估基于WSCM Metric欺骗检测技术的检测性能,图10 展示了传统SQM Metric和WSCM Metric的ROC曲线。相比于传统SQM Metric, 基于WSCM Metric欺骗检测技术优势较为显著,在相同的虚警率下检测概率明 显高于传统SQM Metric,且基本都达到90%以上。在实际中接收机要求虚警率 较低的情况下,比如10%虚警率下,基于WSCM Metric欺骗检测技术相比于检 测性能较好的传统Ratio Metric的检测概率提高40.5%,甚至对于虚警率0.1%情 况下检测概率仍能达到87.5%,这对于接收机欺骗报警有很有高的应用价值。In order to better and more comprehensively evaluate the detection performance of the deception detection technology based on WSCM Metric, Figure 10 shows the ROC curves of traditional SQM Metric and WSCM Metric. Compared with the traditional SQM Metric, the spoofing detection technology based on the WSCM Metric has more significant advantages, and the detection probability is significantly higher than that of the traditional SQM Metric under the same false alarm rate, and basically reaches more than 90%. In practice, when the receiver requires a low false alarm rate, such as a 10% false alarm rate, the detection probability based on the WSCM Metric deception detection technology is increased by 40.5% compared with the traditional Ratio Metric with better detection performance. When the alarm rate is 0.1%, the detection probability can still reach 87.5%, which has high application value for the receiver to deceive alarm.

实验2:无缝接管攻击Experiment 2: Seamless Takeover Attack

图11(a)-11(b)为在无缝接管攻击下,接收机跟踪环路输出结果图,可 以看出,0到110秒之间是不存在欺骗的,此时相关峰并未发生对称性失真。110 秒至150秒欺骗信号侵入接收机跟踪环路,此期间进行载波相位精确对准,同时 功率非线性增加。150秒后至400秒保持欺骗信号的多普勒频率保持与真实信号 的多普勒频率完全相同(频率锁定),同时调整所有欺骗信号相对于其对应真实 信号的码相位从0以每秒1.2米的速率增加,逐渐剥离真实信号的。在剥离阶段 之后,目标接收机跟踪环路锁定欺骗信号,真实信号和欺骗信号之间的最终代码 相位差约为2码片。图11(b)俯视图可以看到,相比于实验1,尽管实验2中 没有相对载波相位的影响,但当欺骗信号和真实信号在功率上近似匹配时,欺骗 很难避免某种构造性或破坏性干扰,但是从图11(a)-(b)中可以看出欺骗信 号和真实信号相关峰的交互作用导致的相关峰对称性失真不足够明显,显然在此 种高级的欺骗攻击模式下更能考验欺骗检测技术性能。Figures 11(a)-11(b) are the output results of the receiver tracking loop under the seamless takeover attack. It can be seen that there is no spoofing between 0 and 110 seconds, and the correlation peak does not occur at this time. Symmetry distortion. Between 110 seconds and 150 seconds the spoofed signal penetrates the receiver tracking loop, during which the carrier phase is precisely aligned and the power increases nonlinearly. After 150 seconds to 400 seconds keep the Doppler frequency of the spoofed signal exactly the same as the real signal (frequency lock), while adjusting the code phase of all spoofed signals relative to their real counterparts from 0 to 1.2 per second The rate of meters is increased, gradually stripping away the true signal. After the stripping phase, the target receiver tracking loop locks onto the spoofed signal, and the final code phase difference between the real and spoofed signals is about 2 chips. As can be seen from the top view of Figure 11(b), compared to Experiment 1, although there is no relative carrier phase effect in Experiment 2, when the spoofing signal and the real signal are approximately matched in power, it is difficult for spoofing to avoid some kind of constructive or Destructive interference, but it can be seen from Figure 11(a)-(b) that the correlation peak symmetry distortion caused by the interaction of the correlation peaks of the spoofed signal and the real signal is not obvious enough, obviously in this advanced spoofing attack mode It can better test the performance of deception detection technology.

采用传统SQM Metric和WSCM Metric进行欺骗检测,图12(a)-12(d) 显示了传统SQM Metric和WSCM Metric在欺骗实施过程中时域瞬时响应,并给 出了对应与恒定虚警率10%的检验阈值。0至110秒四种检测指标的响应与未发 生欺骗情况下的响应保持一致,说明未发生欺骗干扰。110至400秒欺骗信号侵 入,导致相关峰发生对称性失真,传统SQMMetric响应整体表现较为平滑,而 WSCM Metric响应发生显著变化,尤其体现在110至300秒附近,而且在欺骗 实施载波相位对齐阶段(110至150秒),WSCM Metric表现出更加明显的变化, 说明WSCM Metric检测性能更加优越。相比于实验1,四种检验度量的响应整 体偏小,这是由于实验2中采用了更加精细的载波相位对齐,且功率优势更加小, 但这对WSCMMetric检测性能并产生没有明显的影响。Using traditional SQM Metric and WSCM Metric for spoofing detection, Figures 12(a)-12(d) show the time domain instantaneous response of traditional SQM Metric and WSCM Metric in the process of spoofing implementation, and give the corresponding and constant false alarm rate 10 % inspection threshold. The responses of the four detection indicators from 0 to 110 seconds are consistent with the responses in the case of no spoofing, indicating that there is no spoofing interference. From 110 to 400 seconds, the spoofing signal invades, resulting in symmetrical distortion of the correlation peak. The overall performance of the traditional SQMMetric response is relatively smooth, while the WSCM Metric response changes significantly, especially in the vicinity of 110 to 300 seconds. 110 to 150 seconds), WSCM Metric shows more obvious changes, indicating that WSCM Metric has better detection performance. Compared with Experiment 1, the responses of the four test metrics are generally smaller, because in Experiment 2, finer carrier phase alignment is used, and the power advantage is smaller, but this has no obvious impact on the detection performance of WSCMMetric.

同时,图13显示了传统SQM Metric和WSCM Metric在整个欺骗过程中检 测性能随时域变化特性,检测概率是在恒定虚警率10%下设定阈值,每间隔10 秒统计超过阈值的测试总数除以此期间总测试数目计算得到的。可以看出,0至 110秒四种检测技术的检测概率接近于10%,这与之前设定的虚警率一致。110 秒以后,基于WSCM Metric检测技术首先在130秒时有较大的响应,检测概率 达到74.4%,而三种传统SQM Metric检测技术在接近200秒时才发生较大的响 应,响应时间提前了70秒左右,从这一方面来说,相比于传统SQMMetric检测 技术,基于WSCM Metric检测技术在预警时间上有很大的优势。其次在欺骗实施过程中,基于WSCM Metric检测技术在140至300秒期间检测概率达到100%, 300秒以后也始终在80%以上,检测概率明显优于SQM Metric检测技术。此外, 相比于实验1,实验2中的检测技术的检测性能整体在欺骗实施初期表现略差, 但是在后期检测过程中检测性能有了明显的提升。尽管实验1和实验2的欺骗攻 击模式有所差异,但基于WSCM Metric检测技术在这两种场景下的欺骗检测性 能均优于传统SQM Metric检测技术。At the same time, Figure 13 shows the detection performance of traditional SQM Metric and WSCM Metric during the whole deception process. The detection performance changes with time. The detection probability is set at a constant false alarm rate of 10%. The threshold is set, and the total number of tests exceeding the threshold is divided every 10 seconds. Calculated from the total number of tests during this period. It can be seen that the detection probability of the four detection techniques from 0 to 110 seconds is close to 10%, which is consistent with the previously set false alarm rate. After 110 seconds, the detection technology based on WSCM Metric has a larger response at 130 seconds, and the detection probability reaches 74.4%, while the three traditional SQM Metric detection technologies have a larger response when it is close to 200 seconds, and the response time is advanced. About 70 seconds, from this aspect, compared with the traditional SQMMetric detection technology, the detection technology based on WSCM Metric has a great advantage in early warning time. Secondly, in the process of deception implementation, the detection probability based on WSCM Metric detection technology reaches 100% between 140 and 300 seconds, and is always above 80% after 300 seconds. The detection probability is significantly better than SQM Metric detection technology. In addition, compared with Experiment 1, the overall detection performance of the detection technology in Experiment 2 is slightly worse in the initial stage of deception implementation, but the detection performance has been significantly improved in the later detection process. Although the spoofing attack modes of Experiment 1 and Experiment 2 are different, the spoofing detection performance based on WSCM Metric detection technology in both scenarios is better than that of traditional SQM Metric detection technology.

图14展示了传统SQM Metric和WSCM Metric的ROC曲线,相比于三种 传统SQMMetric,WSCM Metric的ROC曲线更加靠近左上角,说明整体检测 性能更优,且在相同虚警率条件下WSCM Metric检测概率都高于三种传统SQM Metric,且基本都在90%以上。此外,在虚警率为10%条件下,相比于检测性能 较好的Delta Metric检测概率提高了24.15%,这与图13中的结论相吻合。对于 实际中要求接收机虚警率很小的条件下基于WSCM Metric技术检测性能优势更 为明显。此外,相比于实验1,实验2中尽管三种传统SQM Metric检测性能有 所变化,但是基于WSCM Metric技术的检测性能并未发生明显的变化,说明基 于WSCM Metric技术可靠性较好,这对于有效应对复杂欺骗技术有很大的提升。Figure 14 shows the ROC curves of traditional SQM Metric and WSCM Metric. Compared with the three traditional SQM Metrics, the ROC curve of WSCM Metric is closer to the upper left corner, indicating that the overall detection performance is better, and WSCM Metric detection under the same false alarm rate conditions The probabilities are higher than the three traditional SQM Metrics, and are basically above 90%. In addition, under the condition of 10% false alarm rate, the detection probability is increased by 24.15% compared with the better detection performance of Delta Metric, which is consistent with the conclusion in Figure 13. In practice, the detection performance advantage based on the WSCM Metric technology is more obvious under the condition that the false alarm rate of the receiver is required to be small. In addition, compared with Experiment 1, although the detection performance of the three traditional SQM Metrics has changed in Experiment 2, the detection performance based on WSCM Metric technology has not changed significantly, indicating that the reliability of WSCM Metric-based technology is better, which is very important for Effectively dealing with complex deception techniques has greatly improved.

此外,传统的SQM Metric很难捕获信号和真实信号之间的相对载波相位的 细微时变的影响,从以上实验可以看出,所提出的基于WSCM欺骗检测方法能 精确地捕获这些效应,获得统计上更高的检测率。因此,基于WSCM Metric的 检测器对频率锁定情况下的欺骗式干扰具有良好的敏感性和鲁棒性,这对于应对 更高级别的欺骗干扰有很大的应用价值。In addition, the traditional SQM Metric is difficult to capture the subtle time-varying effects of the relative carrier phase between the signal and the real signal. It can be seen from the above experiments that the proposed WSCM-based spoofing detection method can accurately capture these effects and obtain statistical higher detection rate. Therefore, the detector based on WSCM Metric has good sensitivity and robustness to spoofing jamming under frequency locking, which has great application value for dealing with higher-level spoofing jamming.

Claims (8)

1. An induced deception detection method based on a weighted second-order central moment is characterized by comprising the following steps of:
1) at least 3 pairs of correlators are symmetrically arranged on the left and right of each channel instant correlator of the receiver to obtain the output value of each correlator;
2) dividing the correlators which are symmetrically arranged into a left group and a right group, and respectively carrying out weighted calculation according to the output values of the correlators in each group to obtain a weighted second-order central moment of a left peak and a weighted second-order central moment of a right peak, wherein the weight of each correlator is determined by the interval of the corresponding correlator relative to the instantaneous correlator and the noise variance of the output values during weighted calculation;
3) the weighted second-order central moment of the left peak and the weighted second-order central moment of the right peak are subtracted to obtain a weighted second-order central moment difference value of the left peak and the right peak, and the mean value and the variance of the difference function are determined according to the distribution condition of the difference function;
4) detecting the difference value by using an NP detector: setting a false alarm rate, calculating a detection threshold value according to the set false alarm rate, the mean value and the variance, comparing the obtained difference value with the detection threshold value, and judging whether deception interference exists or not; and when the absolute value of the difference value between the difference value and the mean value is larger than a detection threshold value, judging that deception jamming exists.
2. The method for induced spoof detection based on weighted second-order central moments as in claim 1, wherein adjacent correlators are equally spaced.
3. The method for induced spoof detection based on weighted second order central moments as in claim 1 or 2, wherein the correlators are arranged in 5 pairs, and the distance between adjacent correlators is 0.2 chips.
4. The method for detecting induced spoofing based on weighted second-order central moments as claimed in claim 1, wherein the calculation formula of the weighted second-order central moments is as follows:
Figure FDA0003483315070000011
in the formula, alpha i N is the weight of the ith correlator, i is 1,2.. n, n is the number of correlators,
Figure FDA0003483315070000012
each correlator comprises an I branch and a Q branch, which are the square sums of the outputs of the in-phase branch (I) and the quadrature branch (Q) of the ith correlator.
5. The method for detecting induced spoofing based on weighted second-order central moment as in claim 4, wherein the correlator weight is calculated by the following formula:
Figure FDA0003483315070000021
Figure FDA0003483315070000022
in the formula (d) i The chip spacing of the ith correlator from the center of symmetry,
Figure FDA0003483315070000023
is the noise variance of the I and Q channels, and k is the discrete time.
6. The induced spoofing detecting method based on weighted second-order central moments as claimed in claim 1 or 4, wherein in the step 3), when determining the mean value and the variance, a feature function of a difference value between the weighted second-order central moments of the left peak and the weighted right peak is determined, the feature function is obtained by multiplying the feature function of the weighted second-order central moments of the left peak and the feature function of the weighted second-order central moments of the right peak, and the calculation formula is as follows:
Figure FDA0003483315070000024
in the formula (I), the compound is shown in the specification,
Figure FDA0003483315070000025
the feature function of the second-order central moment is weighted for the left peak,
Figure FDA0003483315070000026
and weighting a characteristic function of the second-order central moment for the right peak, wherein delta is a non-central parameter of the WSCM, and n is the number of correlators in each group.
7. The method for induced spoof detection based on weighted second order central moments as in claim 1 or 5, wherein the calculation formula of the difference variance is as follows:
Figure FDA0003483315070000027
wherein Z is WSCM E-L The difference value of the second-order central moments is weighted by the left peak and the right peak, n is the number of correlators in each group,
Figure FDA0003483315070000028
the second derivative of the feature function of the second-order central moment is weighted for the left peak, and δ is the non-central parameter of the WSCM.
8. The method for induced spoof detection based on weighted second-order central moments as recited in claim 1, wherein the test threshold is calculated as follows:
Figure FDA0003483315070000029
where γ is the check threshold, erfc -1 Is a function of the inverse of a gaussian function,
Figure FDA0003483315070000031
in order to set the false alarm rate,
Figure FDA0003483315070000032
is the variance of the weighted second-order central moment difference.
CN202210074136.1A 2022-01-21 2022-01-21 Induced deception detection method based on weighted second-order central moment Pending CN114910931A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210074136.1A CN114910931A (en) 2022-01-21 2022-01-21 Induced deception detection method based on weighted second-order central moment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210074136.1A CN114910931A (en) 2022-01-21 2022-01-21 Induced deception detection method based on weighted second-order central moment

Publications (1)

Publication Number Publication Date
CN114910931A true CN114910931A (en) 2022-08-16

Family

ID=82763350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210074136.1A Pending CN114910931A (en) 2022-01-21 2022-01-21 Induced deception detection method based on weighted second-order central moment

Country Status (1)

Country Link
CN (1) CN114910931A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115327580A (en) * 2022-08-25 2022-11-11 中山大学 A timing receiver anti-spoofing method, device and timing receiver
CN116577808A (en) * 2023-07-11 2023-08-11 中国人民解放军战略支援部队航天工程大学 A navigation deception jamming detection method based on receiver correlator output
CN118091711A (en) * 2024-04-26 2024-05-28 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) A GNSS generated synchronization spoofing signal detection method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1360804A (en) * 1999-05-06 2002-07-24 塞-洛克公司 Wireless location system
CN1839615A (en) * 2003-07-22 2006-09-27 探索无线公司 Method and apparatus for searching mobile wireless terminal
CN102142085A (en) * 2011-05-11 2011-08-03 武汉大学 Robust tracking method for moving flame target in forest region monitoring video
CN107179540A (en) * 2017-05-26 2017-09-19 中国民航大学 Based on the GNSS vector receiver anti-interference methods for solving re-spread algorithm
US20180158269A1 (en) * 2014-03-27 2018-06-07 Fst21 Ltd. System and method for identifying fraud attempt of an entrance control system
CN110532989A (en) * 2019-09-04 2019-12-03 哈尔滨工业大学 A kind of automatic detection method of naval target
US20200020062A1 (en) * 2018-07-12 2020-01-16 Lexisnexis Risk Solutions Inc. Systems and methods for entity network analytics
CN113740884A (en) * 2021-09-08 2021-12-03 中国人民解放军战略支援部队信息工程大学 Low-slow small unmanned aerial vehicle target decoy interference effect evaluation method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1360804A (en) * 1999-05-06 2002-07-24 塞-洛克公司 Wireless location system
CN1839615A (en) * 2003-07-22 2006-09-27 探索无线公司 Method and apparatus for searching mobile wireless terminal
CN102142085A (en) * 2011-05-11 2011-08-03 武汉大学 Robust tracking method for moving flame target in forest region monitoring video
US20180158269A1 (en) * 2014-03-27 2018-06-07 Fst21 Ltd. System and method for identifying fraud attempt of an entrance control system
CN107179540A (en) * 2017-05-26 2017-09-19 中国民航大学 Based on the GNSS vector receiver anti-interference methods for solving re-spread algorithm
US20200020062A1 (en) * 2018-07-12 2020-01-16 Lexisnexis Risk Solutions Inc. Systems and methods for entity network analytics
CN110532989A (en) * 2019-09-04 2019-12-03 哈尔滨工业大学 A kind of automatic detection method of naval target
CN113740884A (en) * 2021-09-08 2021-12-03 中国人民解放军战略支援部队信息工程大学 Low-slow small unmanned aerial vehicle target decoy interference effect evaluation method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115327580A (en) * 2022-08-25 2022-11-11 中山大学 A timing receiver anti-spoofing method, device and timing receiver
CN116577808A (en) * 2023-07-11 2023-08-11 中国人民解放军战略支援部队航天工程大学 A navigation deception jamming detection method based on receiver correlator output
CN116577808B (en) * 2023-07-11 2023-09-29 中国人民解放军战略支援部队航天工程大学 A navigation deception interference detection method based on receiver correlator output
CN118091711A (en) * 2024-04-26 2024-05-28 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) A GNSS generated synchronization spoofing signal detection method
CN118091711B (en) * 2024-04-26 2024-07-12 哈尔滨工业大学(深圳)(哈尔滨工业大学深圳科技创新研究院) GNSS generation type synchronous deception signal detection method

Similar Documents

Publication Publication Date Title
CN114910931A (en) Induced deception detection method based on weighted second-order central moment
Gross et al. Maximum-likelihood power-distortion monitoring for GNSS-signal authentication
Sun et al. Robust spoofing detection for GNSS instrumentation using Q-channel signal quality monitoring metric
CN110879404B (en) GNSS deception jamming detection method based on combination of correlation peak and residual signal
Khan et al. Detection of intermediate spoofing attack on global navigation satellite system receiver through slope based metrics
Zhou et al. A new induced GNSS spoofing detection method based on weighted second-order central moment
Broumandan et al. An approach to detect GNSS spoofing
Ali et al. Vestigial signal defense through signal quality monitoring techniques based on joint use of two metrics
Jahromi et al. Galileo signal authenticity verification using signal quality monitoring methods
Pirsiavash et al. Two-dimensional signal quality monitoring for spoofing detection
CN116577808B (en) A navigation deception interference detection method based on receiver correlator output
Zhou et al. Detection of spoofing attacks on global navigation satellite systems using Kolmogorov–Smirnov test-based signal quality monitoring method
Wang et al. GNSS spoofing detection based on unsynchronized double-antenna measurements
Fawky et al. Novel pseudo-noise coded chipless RFID system for clutter removal and tag detection
Gao et al. An underestimated cybersecurity problem: quick-impact time synchronization attacks and a fast-triggered detection method
JP5305395B2 (en) GPS satellite signal quality monitoring method having GPS satellite signal quality monitoring function and GPS satellite signal quality monitoring apparatus having GPS satellite signal quality monitoring function
Rothmaier et al. GNSS spoofing detection through metric combinations: Calibration and application of a general framework
CN117148385A (en) Composite deception jamming detection method based on improved Delta-ELP
Tao et al. GNSS spoofing detection based on consistency check of velocities
CN115327579A (en) A spoofing attack detection method based on signal quality monitoring
Fang et al. A post-correlation graphical way for continuous GNSS spoofing detection
Ghizzo et al. Assessing gnss carrier-to-noise-density ratio estimation in the presence of meaconer interference
Sun et al. Recovering authentic global position system L1 signals under spoofing using dual receiver direct positioning
Pirsiavash et al. Detection and classification of GNSS structural interference based on monitoring the quality of signals at the tracking level
Kuusniemi et al. Signal Quality Indicators and Reliability Testing for Spoof-Resistant GNSS Receiver

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Country or region after: China

Address after: 450000 Science Avenue 62, Zhengzhou High-tech Zone, Henan Province

Applicant after: Information Engineering University of the Chinese People's Liberation Army Cyberspace Force

Address before: No. 62 Science Avenue, High tech Zone, Zhengzhou City, Henan Province

Applicant before: Information Engineering University of Strategic Support Force,PLA

Country or region before: China