Font Size: a A A

Research On Jamming Strategy On GNSS Spoofing Jamming

Posted on:2019-11-22Degree:MasterType:Thesis
Country:ChinaCandidate:J Q ZhangFull Text:PDF
GTID:2428330566998201Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
The Global Navigation Satellite System(GNSS)is widely in many areas,but it is susceptible to interference.The research on GNSS spoofing jamming is beneficial to gaining advantages in navigation confrontation and improving the ability of Beidou system in anti-jamming.GNSS spoofing jamming is researched mainly on jamming strategy in this thesis.Firstly,focused on the jamming strategy in carrier tracking loop,the spoofing signal's probability of being captured is calculated.Focused on the jamming strategy in code tracking loop,the code phase traction scheme is proposed,which is aimed to control the measured value of pseudo range,so the receiver is spoofed by a fake position.Compared to the jamming strategy in carrier tracking loop,code phase traction scheme need less power advantage and it could control the receiver's tracking loop in a more covert way.Secondly,in view of the synchronization of the spoofing signal,the influence of the carrier phase estimation error and the carrier frequency estimation error are analyzed theoretically and experimentally.Compared to the influence of carrier phase estimation error,carrier frequency estimation error damages the stability of the carrier loop more seriously.Thirdly,the deception target's route design is based on ant colony algorithm,which makes full use of the information positive feedback and heuristic search features.As a result,the deception target arrives at the crash area as soon as possible avoiding densely populated and resource intensive areas.Finally,the closed-loop verification in hardware is completed on the commercial software radio platform based on the carrier tracking strategy,and the continuous line traction for the deceptive target's receiver is realized.
Keywords/Search Tags:navigation and positioning, spoofing jamming, capture and tracking, route design
PDF Full Text Request
Related items