Skip to Content
Remote SensingRemote Sensing
  • Article
  • Open Access

13 March 2024

LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm

,
and
1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518063, China
3
School of Marine Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.

Abstract

Due to their low orbit, low-Earth-orbit (LEO) satellites possess advantages such as minimal transmission delay, low link loss, flexible deployment, diverse application scenarios, and low manufacturing costs. Moreover, by increasing the number of satellites, the system capacity can be enhanced, making them the core of future communication systems. However, there have been instances where malicious actors used LEO satellite communication equipment to illegally broadcast events in large sports stadiums or engage in unauthorized leakage of military secrets in sensitive military areas. This has become an urgent issue in the field of communication security. To combat and prevent abnormal and illegal communication activities using LEO satellites, this study proposes a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm. Firstly, a distributed jamming system model for the LEO satellite downlink is established. Then, using a non-dominated sorting genetic algorithm, the jamming parameters are optimized in the power, time, and frequency domains. Field jamming experiments were conducted in the southwest outskirts of Xi’an, China, targeting the LEO constellation of the China Satellite Network. The results indicate that under the condition that the jamming coverage rate is no less than 90%, the proposed method maximizes jamming power, minimizes time delay, and minimizes frequency compensation compared to existing jamming optimization methods, effectively improving the real-time jamming performance and success rate.

1. Introduction

As promising candidates for Beyond 5G (B5G) and 6G communication systems [1], LEO satellites, which can be applied in communications, remote sensing, navigation, and other fields [2,3], have attracted extensive attention in military and civilian fields due to their wide communication coverage and long transmission distances. With the explosive growth of wireless services, future wireless communication systems are expected to provide higher capacity and transmission rates. LEO satellite systems have been proposed to provide broadband access in unserved areas, especially in scenarios where ground network deployment is economically impractical [4,5,6]. However, some criminals have exploited the excellent characteristics of LEO satellites to engage in illegal activities, such as unauthorized broadcasting of events in large stadiums or illegal disclosure of information in military restricted areas. Unauthorized ships often generate extensive jamming to overwhelm satellite signals. These actions result in significant economic losses and pose serious security threats [7]. Therefore, preventing unauthorized actions and the illegal use of LEO satellites has become a crucial issue in the field of communication security.
In terms of electronic countermeasures, existing jamming techniques mainly consist of blanket jamming and deception jamming [8,9]. Blanket jamming is relatively easy to implement but may affect the communication ability of one’s own equipment, which is not an issue with deception jamming [10,11]. Deception jamming is mainly divided into repeater deception jamming and generative deception jamming [12,13,14]. Generative deception jamming primarily targets signals with known formats [15], the operational environment needed for which is lacking in LEO satellite communication. Repeater deception jamming involves adding time delays to various satellite signals before forwarding them. However, achieving precise synchronization is challenging in LEO satellite communication due to the fast movement of satellites [16]. Therefore, optimizing communication jamming for LEO satellites has become an important research direction. Existing jamming optimization methods mainly focus on a single domain. However, due to the frequent network switching in LEO satellite networks, single-domain jamming optimization methods cannot meet the needs of LEO satellite communication jamming. Therefore, finding a real-time multi-domain communication jamming optimization method with a high success rate is urgently needed in the field of LEO satellite countermeasures.
To address these issues, this study extensively studies the composition of LEO satellite communication systems and the time–frequency characteristics of communication signals. Combining the channel model of a LEO satellite and the spatial parameters of jammers, a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm is proposed. The main innovations of this study are as follows:
  • This study proposes a distributed jamming cooperative control model. Distributed jammers determine the specific orientation of visible satellites through intercepting LEO satellite signals, exchange information with surrounding distributed jammers, continuously update and adjust their positions in real time, and achieve continuous switching for different LEO satellites with high speeds.
  • This study utilizes the third-generation non-dominated sorting genetic algorithm for multi-objective optimization, optimizing jamming signals in the power, time, and frequency domains to maintain solution set diversity; improve optimization efficiency; avoid the algorithm falling into local optima; and jam the downlink of LEO satellites.
  • This study constructs a jamming experimental comparison platform and implements it as hardware. Jamming optimization tests are conducted, targeting the LEO constellation of the China Satellite Network in the southwest outskirts of Xi’an, China, in order to verify the effectiveness of the proposed method for jamming the downlink of LEO satellites compared to existing methods.
The rest of the article is organized as follows: Section 2 introduces related works in the field of satellite countermeasures. Section 3 describes the distributed jamming system model for LEO satellite downlinks. Section 4 introduces the distributed jamming method for LEO satellites using the third-generation non-dominated sorting genetic algorithm. Section 5 details the experimental verification and analysis. Finally, Section 6 presents the conclusions.

4. Third-Generation Non-Dominated Sorting Genetic Algorithm

The third-generation non-dominated sorting genetic algorithm (NSGA-III) is an advanced multi-objective evolutionary algorithm designed to address optimization problems with multiple conflicting objectives. It primarily focuses on improving the diversity of solutions and enhancing efficiency to prevent the algorithm from becoming trapped in local optima. The algorithm’s specific process can be summarized as follows: population division into non-dominated levels, the determination of reference points on hyperplanes, adaptive normalization of population individuals, correlation operations, and genetic operations to generate offspring populations. The basic flow is illustrated in Figure 3.
Figure 3. NSGA-III algorithm flowchart.
This study proposes a distributed collaborative jamming optimization method based on NSGA-III. Leveraging the characteristics of distributed jammers collaborating and cross-validating each other through communication, the method involves real-time adjustments of individual positions within a small range. While ensuring a given jamming success rate, optimization is conducted in the power, time, and frequency domains. This results in a spatially distributed deceptive system within the region, contributing to system-level counteraction against LEO constellations.

4.1. Algorithm Flow

4.1.1. Population Division Based on Non-Dominated Layers

We let P t be the parent generation of the t th iteration, with a size of N . The offspring generated from this parent generation is denoted as Q t , also with a size of N . Combining the offspring and parent populations, we obtain R t = P t Q t , with a size of 2 N . From this combined population, N individuals are selected through the following steps:
  • Perform non-dominated sorting on R t , resulting in multiple non-dominated layers F 1 , F 2 , F l .
  • Starting from F 1 , construct a new population S t by sequentially adding members from non-dominated layers ranked 1 to l . If S t = N , set P t + 1 = S t directly. If S t > N , eliminate solutions from layers beyond l . The remaining part for the next generation ( K = N P t + 1 ) is selected from F l , and these solutions constitute P t + 1 = i = 1 l 1 F i .

4.1.2. Determination of Reference Points on the Hyperplane

NSGA-III uses a pre-defined set of reference points to ensure the diversity of the obtained solutions. In the context of a LEO distributed jamming system, the reference points lie on a two-dimensional hyperplane. Each objective is divided into 10 parts, resulting in 55 reference points. The algorithm used to select jamming reference points is as follows:
  • Let X be a two-dimensional variable, taking values from the set 0 , 1 10 , , 11 10 .
  • For each x i j X (the j th element of the i th combination in X ), x i j = x i j j     1 10 .
  • Use S as the set of jamming reference points and obtain coordinates for each objective function:
    s i j = x i j 0 , j = 1 s i j = x i j x i j 1 , j = 2 s i j = 1 x i j 1 , j = 3 .

4.1.3. Adaptive Normalization of Population Individuals

Adaptive normalization is applied in the NSGA-III algorithm to normalize the objective function values of each individual. This helps to maintain a uniform distribution of solutions on the Pareto front. The basic steps for adaptive normalization are as follows:
  • Find the ideal point.
For each dimension of the objectives for individuals in the population S t , find the minimum values m i n f i x i = 1 , 2 , 3 to construct the jamming ideal point z ¯ = m i n P t o t a l , m i n τ i j k , m i n f i j k . Shift the population S t by f i x = f i x z i m i n i = 1 , 2 , 3 to bring the ideal point to the origin.
2.
Calculate extreme points and construct hyperplanes.
The jamming extreme points refer to points where one objective value is large while the others are small. The formula for generating jamming extreme points is as follows:
A S F x , ω = m a x f i x ω i , x S t ω i = τ , ω j i τ , τ = 10 6 , ω j i = 1 z i , m a x = s : a r g m i n s S t A S F x , ω
The lines connecting extreme points and ideal points form three extreme objective vectors z i , m a x i = 1 , 2 , 3 , constituting a 3D jamming hyperplane.
3.
Objective Adaptive Normalization.
The intersection points of the 3D jamming hyperplane and the axes of the power, time, and frequency domains are intercepts a i i = 1 , 2 , 3 . Normalization is carried out according to the following equation using these intercepts:
f i n x = f i x a i z i m i n = f i x z i m i n a i z i m i n ,   f o r   i = 1 , 2 , 3 .

4.1.4. Association Operation

The association operation involves associating individuals in the population with corresponding jamming reference points. The lines between the origin and reference points serve as reference lines. We calculate the distance from each individual in S t to each reference line and associate each individual with the reference line for which it has the shortest distance.

4.1.5. Individual Retention

During the process of individual selection, individuals with fewer associations with jamming reference points should be preserved to maintain diversity. The specific steps are as follows:
  • Select the jamming reference point J m i n with the least number of associations. If there are multiple such jamming reference points, randomly choose one J ¯ . I J ¯ represents the individuals associated with jamming reference point J ¯ in the F l layer.
  • If I J ¯ is empty, re-select the jamming reference point. If I J ¯ is not empty, check whether the number of associations ρ J ¯ in all non-dominated layers before F l with jamming reference point j is 0. If ρ J ¯ = 0 , select the individual with the minimum distance to J ¯ from I J ¯ for the next generation. If ρ J ¯ 0 , randomly choose an individual from I J ¯ for the next generation.
  • Repeat the operation until the size of the next generation equals N .

5. Experimental Analysis

Field tests were conducted in the southwest outskirts of Xi’an, China, using the LEO satellite downlink distributed jamming optimization method with non-dominated sorting genetic algorithm proposed in this article, targeting the LEO constellation of the China Satellite Network. The experimental area is illustrated in Figure 4.
Figure 4. Experimental test site map.
The jamming equipment carrier and the onboard jamming equipment used in the experiments are illustrated in Figure 5.
Figure 5. Experimental equipment.
The specific jamming parameters for the experiments are outlined in Table 1.
Table 1. Jamming scene parameter settings.
Three jamming scenarios were created:
  • The first scenario compares the target function with the optimal solution set;
  • The second scenario compares coverage optimization over time;
  • The third scenario compares the success rate of jamming within a certain region.

5.1. Objective Function and Optimal Solution Set Optimization

5.1.1. Objective Function Comparison

In the experimental testing of objective function optimization, the proposed third-generation non-dominated sorting genetic algorithm (NSGA-III) based on reference points for LEO satellite jamming was tested under the constraint of at least 90% jamming coverage. Subsequently, it was compared with the constraint-based dual-population evolutionary algorithm (c-DPEA), multi-task constraint multi-objective optimization algorithm (MTCMO), multi-strategy improved continuous explosive algorithm (MSCEA), and constraint-based multi-objective optimization algorithm utilizing unconstrained and constrained Pareto front relationships (URCMO). After 100 iterations, the multi-objective Pareto frontier sets for power, delay, and frequency compensation were obtained, as shown in Figure 6.
Figure 6. Pareto frontiers generated with different optimization algorithms.
From Figure 6, it can be observed that the objective function values generated with the URCMO algorithm were scattered and did not converge to a stable Pareto frontier, while the other four algorithms all converged to a stable Pareto frontier, with the Pareto frontier generated with the MSCEA algorithm being relatively divergent. In terms of total jamming power, the NSGA-III algorithm optimization produced a jamming power of −125 dBm, while the jamming powers optimized with the MSCEA, c-DPEA, and MTCMO algorithms were all around −128 dBm, thus proving that the NSGA-III algorithm maximized the jamming power. Under similar total frequency compensation, the NSGA-III algorithm produced a smaller total delay compared to the other three algorithms, for instance, at a total relay delay of 1.2 μs with a total frequency compensation of 724 KHz for low-Earth-orbit constellations, while those of the other algorithms were all around 1.76 μs. Similarly, under a similar total delay, the NSGA-III algorithm produced smaller total frequency compensation compared to the other three algorithms; for example, at a total delay of 1.4 μs, a total frequency compensation of 695 KHz was obtained for low-Earth-orbit constellations, while those of the other algorithms were around 800 KHz, thereby demonstrating the effectiveness of the NSGA-III algorithm in optimizing in the power, time, and frequency domains for distributed jamming of the LEO satellites’ downlink.

5.1.2. Dominant Solution Set Comparison

The Feasible-Rate and Spread metrics were used to measure the feasibility and spread of the dominant solution set, respectively. Feasible-Rate assesses the proportion of solutions that satisfy all constraints and have variables within the upper and lower bounds among all generated solutions, where a higher Feasible-Rate indicates the better feasibility of the generated optimal solution set. Spread calculates the standard deviation of the distances between individuals that are farthest apart on each objective, where a larger Spread indicates a wider distribution of the algorithm’s generated solution set, making it less prone to local optima.
In the performance experiment regarding the solution set, under the same conditions as the objective function optimization test, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The Feasible-Rate and Spread values for the optimized dominant solution sets were obtained after testing, and they are shown in Figure 7 and Figure 8.
Figure 7. Feasible-Rate generated with different optimization algorithms.
Figure 8. Spread values generated with different optimization algorithms.
From Figure 7, it can be seen that the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms converged to a Feasible-Rate of 1 at the 27th, 42nd, 55th, 49th, and 72nd iterations, respectively. This indicates that the dominant solution sets generated with all five algorithms satisfied the constraints and had extremely high feasibility. Additionally, the NSGA-III algorithm converged faster than the other four algorithms.
Taking the example of the last 20 iterations when the dominant solution sets generated with all five algorithms satisfied the constraints (Feasible-Rate = 1), Figure 8 shows that the Spread values obtained with the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms were 1.157, 1.018, 1.036, 1.013, and 1.033, respectively. The NSGA-III algorithm produced the largest Spread, demonstrating the excellent spread of the dominant solution set generated with the NSGA-III algorithm when optimizing LEO satellite distributed jamming.
In summary, the feasibility, convergence, and spread of the dominant solution set generated with the NSGA-III algorithm were far superior to those of the other four algorithms. This confirms the strong overall performance of the NSGA-III algorithm in optimizing distributed jamming for LEO satellite constellations.

5.2. Coverage Optimization

Jamming coverage measures the degree to which key areas are covered by jamming beams. The proportion of ground users covered by jamming beams in a certain area was used as an indicator of jamming coverage. In the experiment testing jamming coverage optimization, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The changes in jamming coverage rates for the different optimization algorithms are plotted in Figure 9.
Figure 9. Variation curve of jamming coverage rates for different optimization methods.
In Figure 9, it can be observed that the initial coverage rate of the NSGA-III algorithm was the highest (at 84%), while the URCMO algorithm had the lowest initial coverage rate (at 60%). With an increase in the number of iterations, the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms reached jamming coverage rates of over 90% at the 21st, 32nd, 49th, 40th, and 60th iterations, respectively, satisfying the set jamming coverage rate constraint. At the end of the iterations, the coverage rate of the NSGA-III algorithm reached 100%; the coverage rates under the MSCEA, c-DPEA, and MTCMO algorithms were 96%; and the coverage rate of the URCMO algorithm was 92%. This demonstrates the efficiency of the NSGA-III algorithm in optimizing the jamming coverage rate in the context of LEO satellite downlink distributed jamming.

5.3. Jamming Success Rate Optimization

The jamming success rate is the core indicator of jamming optimization. The total receiver bit error rate in a certain area measured according to actual satellite signals was used to reflect the jamming success rate, where a higher bit error rate indicates a higher jamming success rate. In the experiment testing jamming success rate optimization, assuming that LEO satellites send a 1000-bit stream to ground users and under the constraint of at least 90% jamming coverage, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The changes in the bit error rates corresponding to different optimization algorithms are plotted in Figure 10.
Figure 10. Variation curves for jamming coverage rates using different optimization methods.
From Figure 10, it can be observed that during the initial iterations, the NSGA-III algorithm produced the highest bit error rate, while the URCMO algorithm produced the lowest bit error rate. With an increase in the number of iterations, the bit error rate of the NSGA-III algorithm grew the most, surpassing the other four algorithms, while the bit error rate growth of the URCMO algorithm was the smallest. At the end of the iterations, the NSGA-III algorithm generated 102 bit errors; the c-DPEA and MTCMO algorithms produce 51 and 45 bit errors, respectively; the MSCEA algorithm produced 38 bit errors; and the URCMO algorithm produced only 24 bit errors. These results demonstrate the efficiency of the NSGA-III algorithm for optimizing the jamming success rate in distributed jamming of the LEO satellites’ downlinks.

6. Conclusions

This study aimed to prevent attacks on satellites by unauthorized ships in maritime scenarios, as well as activities such as illegal broadcasting in large sports stadiums or illegal leakage of military secrets in critical areas by taking advantage of the high transmission rate and low latency of LEO satellite communication systems, which pose serious threats to the national economy and security. In particular, a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm was proposed. Field jamming tests were conducted on the LEO constellation of the China Satellite Network in the southwest outskirts of Xi’an, China, and comparative experiments were performed against traditional jamming optimization methods, considering the objective functions, optimal solution sets, jamming coverage, and jamming success rates. The results indicated that under the condition of jamming coverage being no less than 90%, the proposed method outperformed the considered existing jamming optimization methods in terms of optimization in the power, time, and frequency domains, yielding a more extensive, scalable, and convergent solution set, thus effectively improving the real-time jamming performance and success rate. The method proposed in this article holds significant application value in both military and civilian security fields. In the future, we plan to conduct further research in order to explore its application in different communication jamming scenarios.

Author Contributions

Conceptualization, L.Z.; Software, L.Z.; Writing—original draft, J.D.; Writing—review & editing, C.T. All authors have read and agreed to the published version of the manuscript.

Funding

National Natural Science Foundation of China: 62171735, 62271397, 62173276, 62101458, 62001392, 61803310, 61801394; Natural Science Basic Research Program of Shaanxi: 2022GY-097, 2021JQ-122, 2021JQ-693; Shenzhen Science and Technology Program: JCYJ20220530161615033.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  2. Lin, X.; Cioni, S.; Charbit, G.; Chuberre, N.; Hellsten, S.; Boutillon, J.-F. On the path to 6G: Embracing the next wave of low Earth orbit satellite access. IEEE Commun. Mag. 2021, 59, 36–42. [Google Scholar] [CrossRef]
  3. Yue, P.; An, J.; Zhang, J.; Ye, J.; Pan, G.; Wang, S.; Xiao, P.; Hanzo, L. Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead. IEEE Commun. Surv. Tutor. 2023, 25, 1604–1652. [Google Scholar] [CrossRef]
  4. An, K.; Lin, M.; Ouyang, J.; Zhu, W.-P. Secure transmission in cognitive satellite terrestrial networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  5. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-band. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 2604–2611. [Google Scholar] [CrossRef]
  6. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks. IEEE Wirel. Commun. Lett. 2020, 10, 251–255. [Google Scholar] [CrossRef]
  7. Monzon Baeza, V.; Ortiz, F.; Herrero Garcia, S.; Lagunas, E. Enhanced Communications on Satellite-Based IoT Systems to Support Maritime Transportation Services. Sensors 2022, 22, 6450. [Google Scholar] [CrossRef]
  8. Alrefaei, F.; Alzahrani, A.; Song, H.; Alrefaei, S. A survey on the jamming and spoofing attacks on the unmanned aerial vehicle networks. In Proceedings of the 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 1–4 June 2022; pp. 1–7. [Google Scholar]
  9. Shi, Q.; Wang, Y.; Wang, C.; Feng, Q.; Yuan, N. A novel deceptive and blanket joint jammer. In Proceedings of the 2017 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xiamen, China, 22–25 October 2017; pp. 1–4. [Google Scholar]
  10. Yang, Z.; Zhang, B.; Zhang, K.; Shi, J.; Li, Z.; Huang, C.; Zhou, Q. Efficient Waveform Design with Jamming Characteristics for Precision Electronic Warfare. Signal Process. 2023, 212, 109162. [Google Scholar] [CrossRef]
  11. Pärlin, K.; Riihonen, T.; Le Nir, V.; Bowyer, M.; Ranstrom, T.; Axell, E.; Asp, B.; Ulman, R.; Tschauner, M.; Adrat, M. Full-duplex tactical information and electronic warfare systems. IEEE Commun. Mag. 2021, 59, 73–79. [Google Scholar] [CrossRef]
  12. Meng, L.; Yang, L.; Yang, W.; Zhang, L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022, 14, 4826. [Google Scholar] [CrossRef]
  13. Wu, Z.; Zhang, Y.; Yang, Y.; Liang, C.; Liu, R. Spoofing and anti-spoofing technologies of global navigation satellite system: A survey. IEEE Access 2020, 8, 165444–165496. [Google Scholar] [CrossRef]
  14. Tedeschi, P.; Sciancalepore, S.; Di Pietro, R. Satellite-based communications security: A survey of threats, solutions, and research challenges. Comput. Netw. 2022, 216, 109246. [Google Scholar] [CrossRef]
  15. Ni, S.; Cui, J.; Cheng, N.; Liao, Y. Detection and elimination method for deception jamming based on an antenna array. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718774466. [Google Scholar] [CrossRef]
  16. Wang, H.; Chang, Q.; Xu, Y. Deception jamming detection based on beam scanning for satellite navigation systems. IEEE Commun. Lett. 2021, 25, 2703–2707. [Google Scholar] [CrossRef]
  17. Meggs, R.; Watson, R. Spoofing and Jamming of GNSS Signals: Are They Real and What Can We Do about Them? In Proceedings of the Conference Proceedings of iSCSS, Delft, The Netherlands, 6–8 October 2020. [Google Scholar]
  18. Wang, P.; Lu, X.; Wang, R. Research on Blanket Jamming to Beidou Navigation Signals Based on BOC Modulation. Int. J. Commun. Netw. Syst. Sci. 2016, 9, 135–144. [Google Scholar] [CrossRef]
  19. Xu, R.; Hu, Y.H.; Zhang, T.; Zhang, F. Research on Effect of Blanket Jamming on GNSS Signal. Adv. Mater. Res. 2014, 846, 956–961. [Google Scholar] [CrossRef]
  20. Silva Lorraine, K.J.; Ramarakula, M. A comprehensive survey on GNSS interferences and the application of neural networks for anti-jamming. IETE J. Res. 2023, 69, 4286–4305. [Google Scholar] [CrossRef]
  21. Dovis, F. GNSS Interference Threats and Countermeasures; Artech House: Sydney, NSW, Australia, 2015. [Google Scholar]
  22. Garcia-Pena, A.; Julien, O.; Macabiau, C.; Mabilleau, M.; Durel, P. GNSS degradation model in presence of continuous wave and pulsed interference. Navigation 2021, 68, 75–91. [Google Scholar] [CrossRef]
  23. Qiao, J.; Lu, Z.; Lin, B.; Song, J.; Xiao, Z.; Wang, Z.; Li, B. A survey of GNSS interference monitoring technologies. Front. Phys. 2023, 11, 1133316. [Google Scholar] [CrossRef]
  24. Lei, Z.; Ding, P.; Zheng, W.; Fei, X.; Fan, H. UAV Countermeasure Technology Based on Partial-band Noise Jamming. In Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC), Kunming, China, 22–24 May 2021; pp. 1456–1461. [Google Scholar]
  25. Karpe, R.V.; Kulkarni, S. Software defined radio based global positioning system jamming and spoofing for vulnerability analysis. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 881–888. [Google Scholar]
  26. Wang, Z.; Wang, H.; Cao, N. Research on Spoofing Jamming of Integrated Navigation System on UAV. In Proceedings of the Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, 19–23 July 2021; pp. 3–13. [Google Scholar]
  27. Li, X.; Chen, L.; Lu, Z.; Wang, F.; Liu, W.; Xiao, W.; Liu, P. Overview of Jamming Technology for Satellite Navigation. Machines 2023, 11, 768. [Google Scholar] [CrossRef]
  28. Youda, W.; Pengcheng, M.A.; Junwei, N.; Guangfu, S. Study of Multi-Station Retransmission Spoofing Methods Based on Protection of Fixed Target. GNSS World China 2016, 41, 60–65. [Google Scholar]
  29. Tang, C.; Ding, J.; Qi, H.; Zhang, L. Smart forwarding deceptive jamming distribution optimal algorithm. IET Radar Sonar Navig. 2024, 1–12. [Google Scholar] [CrossRef]
  30. Wang, Y.; Sun, F.; Wang, X.; Hao, J.; Xiao, K. Full-domain collaborative deployment method of multiple interference sources and evaluation of its deployment effect. Def. Technol. 2023, 32, 572–595. [Google Scholar] [CrossRef]
  31. Hao, Z.; Wang, X.; Wang, J. A Study of Jamming Resource Allocation Based on a Hyperheuristic Framework. Res. Sq. 2022; preprint. [Google Scholar] [CrossRef]
  32. Fang, F.; Chunming, Y.; Haibo, L. Jammer Placement Algorithm Based on Particle Swarm Optimization. J. Syst. Simul. 2019, 31, 1101–1110. [Google Scholar] [CrossRef]
  33. Xinxin, Z.; Chengjun, G.; Yawen, C. Optimal Design of Interference Source Based on Ant Colony Algorithm. GNSS World China 2017, 42, 20. [Google Scholar] [CrossRef]
  34. Luo, Z.; Deng, M.; Yao, Z.; Leng, X.; Chen, Y. Distributed blanket jamming resource scheduling for satellite navigation based on particle swarm optimization and genetic algorithm. In Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; pp. 611–616. [Google Scholar]
  35. Ye, F.; Che, F.; Gao, L. Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm. Int. J. Aerosp. Eng. 2018, 2018, 7490895. [Google Scholar] [CrossRef]
  36. Qingwen, Q.; Wenfeng, D.; Meiqing, L.; Yang, Y. Cooperative jamming resource allocation of UAV swarm based on multi-objective DPSO. In Proceedings of the 2018 Chinese Control and Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; pp. 5319–5325. [Google Scholar]
  37. Maseng, T.; Bakken, P. A Stochastic Dynamic Model of Rain Attenuation. IEEE Trans. Commun. 1981, 29, 660–669. [Google Scholar] [CrossRef]
  38. Baeza, V.M.; Lagunas, E.; Al-Hraishawi, H.; Chatzinotas, S. An Overview of Channel Models for NGSO Satellites. In Proceedings of the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 26–29 September 2022; pp. 1–6. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.