Next Article in Journal
Impacts of Crop Type and Climate Changes on Agricultural Water Dynamics in Northeast China from 2000 to 2020
Previous Article in Journal
Assessing Tree Water Balance after Forest Thinning Treatments Using Thermal and Multispectral Imaging
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm

1
School of Electronics and Information, Northwestern Polytechnical University, Xi’an 710072, China
2
Research & Development Institute of Northwestern Polytechnical University in Shenzhen, Shenzhen 518063, China
3
School of Marine Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
*
Author to whom correspondence should be addressed.
Remote Sens. 2024, 16(6), 1006; https://doi.org/10.3390/rs16061006
Submission received: 25 January 2024 / Revised: 8 March 2024 / Accepted: 11 March 2024 / Published: 13 March 2024

Abstract

:
Due to their low orbit, low-Earth-orbit (LEO) satellites possess advantages such as minimal transmission delay, low link loss, flexible deployment, diverse application scenarios, and low manufacturing costs. Moreover, by increasing the number of satellites, the system capacity can be enhanced, making them the core of future communication systems. However, there have been instances where malicious actors used LEO satellite communication equipment to illegally broadcast events in large sports stadiums or engage in unauthorized leakage of military secrets in sensitive military areas. This has become an urgent issue in the field of communication security. To combat and prevent abnormal and illegal communication activities using LEO satellites, this study proposes a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm. Firstly, a distributed jamming system model for the LEO satellite downlink is established. Then, using a non-dominated sorting genetic algorithm, the jamming parameters are optimized in the power, time, and frequency domains. Field jamming experiments were conducted in the southwest outskirts of Xi’an, China, targeting the LEO constellation of the China Satellite Network. The results indicate that under the condition that the jamming coverage rate is no less than 90%, the proposed method maximizes jamming power, minimizes time delay, and minimizes frequency compensation compared to existing jamming optimization methods, effectively improving the real-time jamming performance and success rate.

Graphical Abstract

1. Introduction

As promising candidates for Beyond 5G (B5G) and 6G communication systems [1], LEO satellites, which can be applied in communications, remote sensing, navigation, and other fields [2,3], have attracted extensive attention in military and civilian fields due to their wide communication coverage and long transmission distances. With the explosive growth of wireless services, future wireless communication systems are expected to provide higher capacity and transmission rates. LEO satellite systems have been proposed to provide broadband access in unserved areas, especially in scenarios where ground network deployment is economically impractical [4,5,6]. However, some criminals have exploited the excellent characteristics of LEO satellites to engage in illegal activities, such as unauthorized broadcasting of events in large stadiums or illegal disclosure of information in military restricted areas. Unauthorized ships often generate extensive jamming to overwhelm satellite signals. These actions result in significant economic losses and pose serious security threats [7]. Therefore, preventing unauthorized actions and the illegal use of LEO satellites has become a crucial issue in the field of communication security.
In terms of electronic countermeasures, existing jamming techniques mainly consist of blanket jamming and deception jamming [8,9]. Blanket jamming is relatively easy to implement but may affect the communication ability of one’s own equipment, which is not an issue with deception jamming [10,11]. Deception jamming is mainly divided into repeater deception jamming and generative deception jamming [12,13,14]. Generative deception jamming primarily targets signals with known formats [15], the operational environment needed for which is lacking in LEO satellite communication. Repeater deception jamming involves adding time delays to various satellite signals before forwarding them. However, achieving precise synchronization is challenging in LEO satellite communication due to the fast movement of satellites [16]. Therefore, optimizing communication jamming for LEO satellites has become an important research direction. Existing jamming optimization methods mainly focus on a single domain. However, due to the frequent network switching in LEO satellite networks, single-domain jamming optimization methods cannot meet the needs of LEO satellite communication jamming. Therefore, finding a real-time multi-domain communication jamming optimization method with a high success rate is urgently needed in the field of LEO satellite countermeasures.
To address these issues, this study extensively studies the composition of LEO satellite communication systems and the time–frequency characteristics of communication signals. Combining the channel model of a LEO satellite and the spatial parameters of jammers, a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm is proposed. The main innovations of this study are as follows:
  • This study proposes a distributed jamming cooperative control model. Distributed jammers determine the specific orientation of visible satellites through intercepting LEO satellite signals, exchange information with surrounding distributed jammers, continuously update and adjust their positions in real time, and achieve continuous switching for different LEO satellites with high speeds.
  • This study utilizes the third-generation non-dominated sorting genetic algorithm for multi-objective optimization, optimizing jamming signals in the power, time, and frequency domains to maintain solution set diversity; improve optimization efficiency; avoid the algorithm falling into local optima; and jam the downlink of LEO satellites.
  • This study constructs a jamming experimental comparison platform and implements it as hardware. Jamming optimization tests are conducted, targeting the LEO constellation of the China Satellite Network in the southwest outskirts of Xi’an, China, in order to verify the effectiveness of the proposed method for jamming the downlink of LEO satellites compared to existing methods.
The rest of the article is organized as follows: Section 2 introduces related works in the field of satellite countermeasures. Section 3 describes the distributed jamming system model for LEO satellite downlinks. Section 4 introduces the distributed jamming method for LEO satellites using the third-generation non-dominated sorting genetic algorithm. Section 5 details the experimental verification and analysis. Finally, Section 6 presents the conclusions.

2. Related Work

Early satellite communication had low coverage, and research into satellite signal jamming techniques primarily targeted the navigation field [17], which can be divided into three categories: jamming methods, jammer deployment, and jamming efficiency optimization.
Jamming methods mainly include blanket jamming and deception jamming. Blanket jamming involves emitting signals with certain bandwidths and higher power on the frequency band where the satellite operates, causing receivers to lose their lock [18,19]. Studies in the literature [20,21,22,23,24] have investigated various blanket jamming methods, such as wideband noise jamming, partial-band noise jamming, single-tone jamming, multi-tone jamming, and pulse jamming. Their results demonstrated that blanket jamming has a wide coverage area and can effectively jam target receivers within a certain range. However, blanket jamming also affects communication of other devices and is not suitable for jamming when considering LEO satellite communication. Deception jamming includes repeater deception jamming and generative deception jamming and involves generating deceptive signals that are highly similar to genuine satellite signals or re-transmitting genuine signals, causing receivers to lock onto deceptive signals as genuine ones, resulting in erroneous output. Studies in the literature [25] have carried out jamming with terminals through simulating satellite signals. However, generative deception jamming requires specific knowledge of the genuine signal’s format in advance and lacks practical use in LEO satellite communication jamming. Ref. [26] achieved the jamming of an unmanned aerial vehicle (UAV) integrated navigation system through controlling delays and subsequently re-transmitting of satellite signals. Repeater deception jamming does not require extensive prior information but is susceptible to being identified as multi-path jamming by receivers, limiting its effectiveness in LEO satellite communication jamming.
The deployment of jammers is an effective means to combat anti-jamming techniques, such as anti-adaptive nulling and beamforming [27]. In [28], a multi-station repeater deception jamming deployment method was proposed based on delay control, which protects fixed targets by analyzing the impact of delays of different magnitudes on the effective jamming region. In [29], a multi-station repeater deception jamming deployment method based on equivalent mapping was presented, which can realize area mapping and trajectory mapping while improving the jamming success rate. In [30], principles for the coordinated deployment of multiple jammers were formulated, and a deployment structure for the coordinated deployment of three jammers was obtained, thereby achieving full-domain coordinated deployment of multiple jammers. However, traditional jammer deployment methods lack flexibility and struggle to adapt to the high-speed movement of LEO satellites.
Jamming efficiency optimization can achieve better jamming effects under the same resource configuration conditions [31]. In [32], a particle swarm optimization-based jammer optimization algorithm was proposed, in which the packet delivery ratio was used as the objective function to select the optimal jamming position. However, such single-objective jamming optimization methods cannot counteract the anti-jamming measures of LEO satellites. The study [33] introduced a distributed communication jamming resource allocation method based on improved particle swarm optimization, optimizing the objectives of regional coverage rate and average danger coefficient to address issues such as low efficiency in resource allocation and uncertain jamming benefits in distributed communication jamming. However, such methods only consider two optimization objectives, making it difficult to directly obtain the optimal solution when there are more objective functions. In [34], a satellite navigation distributed blanket jamming resource scheduling method based on particle swarm optimization and a genetic algorithm was proposed, in which the objectives of bit error rate, pseudorange measurement error, and jamming cost were optimized. This method effectively scheduled limited resources. Such methods simplify multi-objective optimization into single-objective optimization using linear weighting, but the selection of weighting coefficients directly affects the bias of the final solution. In [35], a taboo search-artificial bee colony algorithm for cognitive cooperative jamming decision-making, which considers multiple objective functions for optimization, was proposed, making it less likely to fall into local optimal solutions. However, such methods have a slow convergence speed during optimization, making it difficult to ensure real-time jamming. Ref. [36] introduced an improved discrete particle swarm optimization algorithm, which can provide the most suitable allocation scheme according to the requirements of different tasks, effectively addressing the static allocation problem of jamming resources. However, the search space of the populations used in such methods is not broad enough, making it easy to fall into using local optimal solutions and difficult to guarantee a certain jamming success rate.
The limitations of existing jamming methods, poor flexibility in the deployment of jammers, and subpar decision-making performance in jamming efficiency optimization highlight the shortcomings of the current methods. In response to these deficiencies, this study proposes a LEO satellite downlink distributed jamming optimization method with a non-dominated sorting genetic algorithm, which offers strong flexibility and effectively enhances the real-time jamming performance and success rates.

3. Distributed Jamming System Model for LEO Constellation Downlink

By identifying and separating the signals of LEO satellites and incorporating the positional information of distributed jammers and the satellite constellation, a LEO satellite downlink distributed jamming system model was constructed. The system consists of the LEO satellites, jammers, and ground jamming targets, as shown in Figure 1, where J N represents the N th distributed jammer, S k represents the K th LEO satellite, and U M represents the M th ground jamming target. The green lightning-like lines represent communication links between LEO satellites, yellow lightning-like lines represent communication links between onboard distributed jammers, orange dashed lines represent the interception links of onboard distributed jammers to signals from LEO satellites, blue dashed lines represent the beam coverage of LEO satellites to ground targets, and red solid lines represent the beam coverage of onboard distributed jammers to ground targets. The Maseng–Bakken model (MBM) [37,38], which assumes that the rate of change in rain attenuation is proportional to its instantaneous value, was adopted as the downlink channel model.
All distributed jammers were equipped with satellite navigation and communication receivers, providing the possibility for these jammers to collaboratively network with each other.
Based on the identification and localization of each satellite within the region, and utilizing the positional information of jammers in the satellite-to-ground link domain, a multi-objective jamming resource scheduling model was constructed, as illustrated in Figure 2. Considering the different deception strategies of distributed jammers in the power, time, and frequency domains, the optimization and coordinated control of distributed deceptive jammers are implemented. This allows for coordinated jamming in the satellite-to-ground links of multiple LEO satellites within the region, disrupting the downlink communication network of the LEO satellite constellation.

3.1. Jamming Evaluation Metrics

3.1.1. Total Jamming Power

In the downlink, satellite beams and ground user terminals often adopt a staring mode. Ground user terminals typically have multiple antenna transceiver capabilities. The main lobe and side lobes of the receiving antenna at the user terminal are susceptible to jamming signals from other systems and can encompass or accommodate the main characteristics of all potential jamming scenarios.
In practical scenarios, due to the large number of low-Earth-orbit satellite constellations, most jamming manifests as overlapping jamming from multiple jammers affecting the same ground user terminal, known as aggregate jamming. Therefore, the aggregate jamming power received at the ground user terminal is the sum of the jamming power caused by distributed jammers within the communication elevation angle range. This can be expressed as follows:
P t o t a l = i P r i P r i = P t + G t L + G r G t / r = 10 l g 4.5 × D λ 2 L = 92.4 + 20 l g f + 20 l g d i
where P t represents the transmit power of the jamming signal, G t represents the gain of the jamming signal transmit antenna, L represents the free-space loss, and G r represents the gain of the receiving antenna in the jammed system. Additionally, D is the size of the antenna, λ is the wavelength at the center frequency, f is the signal frequency, and d i is the distance between the ground user and the i th jammer.

3.1.2. Time Delay

Distributed jamming systems operate on the principle of time delay deception. The system deceives the jamming device by receiving all currently available satellite signals, thus determining whether they are all visible to the ground receiver. After spatial separation, a time delay is applied to each visible satellite signal individually. The amalgamated deceptive signals are then broadcast to the target receiving device on the ground. By ensuring that the peaks of the deceptive signals surpass those of the genuine signals, the tracking loop of the target-receiving device can lock onto the deceptive signals and generate incorrect position solutions.
When the target receiving device tracks the deceptive signals, the pseudorange from the j th jamming device forwarding the signal from the i th satellite to the kth target point is given by
ρ = r i L r j Z + r j Z r k T + c · τ i j k + c · δ ,
where r i L represents the position of the i th satellite, r j Z represents the position of the j th jammer, r k T represents the position of the k th target receiver, δ represents the receiver clock bias, and τ i j k represents the delay added when the j th jammer forwards the signal from the i th satellite to the k th user.
Assuming that the desired location is represented by the vector r k C , the pseudorange from the i th satellite to the k th fictitious target point is given by
ρ = r i L r k C + c · δ .
By letting
ρ = ρ ,
the delay added when the j th jammer forwards the signal from the i th satellite to the k th user can be determined as follows:
τ i j k = r i L r k C r i L r j Z r j Z r k T c .

3.1.3. Frequency Compensation

Due to the high operational speeds of low-Earth-orbit satellites, the Doppler effect introduced by the relayed deceptive signals and genuine satellite signals reaching the receiver can result in deviations. Therefore, during the forwarding process, frequency compensation is necessary for the deceptive signals to ensure that the velocity measurements at the target-receiving device align with the actual values.
Assuming that the velocities of the i th satellite and the j th jammer are represented by the vectors V i L and V j Z , respectively, and that the satellite’s emission frequency is f 0 , then the Doppler frequency shift of the i th satellite and the j th jammer can be expressed as follows:
f i j Z = f 0 V i j Z c = f 0 c · r i L r j Z · V i L V j Z r i L r j Z .
Similarly, for the relative velocity and Doppler frequency shift between the i th satellite and the k th target receiver, we have
f i k T = f 0 V i k T c = f 0 c · r i L r k T · V i L V k T r i L r k T .
Therefore, the compensatory Doppler frequency shift is
f i j k = f i k T f i j Z .

3.1.4. Jamming Coverage Rate

In practical distributed jamming optimization, the jamming coverage rate is typically measured using the ratio or multiplicity of coverage from the beams formed by jammers after collaborative networking, targeting specific users in a given area. Therefore, in a specific jamming task, the jamming coverage rate can be expressed as follows:
η = n u m U s e r s c o v e r n u m U s e r s
where n u m U s e r s c o v e r is the total number of targets covered by all the jammers, and n u m U s e r s is the total number of targets.

3.2. Multi-Objective Optimization Objective Functions and Constraints

In the distributed jamming system of LEO constellations, considering a given jamming success rate, the multi-objective optimization problem involves maximizing the total jamming power, minimizing relay delay, and minimizing frequency compensation. This can be formulated as follows:
m a x P t o t a l m i n τ i j k m i n f i j k s . t . : η η 0
where η 0 is the minimum required jamming coverage rate.

4. Third-Generation Non-Dominated Sorting Genetic Algorithm

The third-generation non-dominated sorting genetic algorithm (NSGA-III) is an advanced multi-objective evolutionary algorithm designed to address optimization problems with multiple conflicting objectives. It primarily focuses on improving the diversity of solutions and enhancing efficiency to prevent the algorithm from becoming trapped in local optima. The algorithm’s specific process can be summarized as follows: population division into non-dominated levels, the determination of reference points on hyperplanes, adaptive normalization of population individuals, correlation operations, and genetic operations to generate offspring populations. The basic flow is illustrated in Figure 3.
This study proposes a distributed collaborative jamming optimization method based on NSGA-III. Leveraging the characteristics of distributed jammers collaborating and cross-validating each other through communication, the method involves real-time adjustments of individual positions within a small range. While ensuring a given jamming success rate, optimization is conducted in the power, time, and frequency domains. This results in a spatially distributed deceptive system within the region, contributing to system-level counteraction against LEO constellations.

4.1. Algorithm Flow

4.1.1. Population Division Based on Non-Dominated Layers

We let P t be the parent generation of the t th iteration, with a size of N . The offspring generated from this parent generation is denoted as Q t , also with a size of N . Combining the offspring and parent populations, we obtain R t = P t Q t , with a size of 2 N . From this combined population, N individuals are selected through the following steps:
  • Perform non-dominated sorting on R t , resulting in multiple non-dominated layers F 1 , F 2 , F l .
  • Starting from F 1 , construct a new population S t by sequentially adding members from non-dominated layers ranked 1 to l . If S t = N , set P t + 1 = S t directly. If S t > N , eliminate solutions from layers beyond l . The remaining part for the next generation ( K = N P t + 1 ) is selected from F l , and these solutions constitute P t + 1 = i = 1 l 1 F i .

4.1.2. Determination of Reference Points on the Hyperplane

NSGA-III uses a pre-defined set of reference points to ensure the diversity of the obtained solutions. In the context of a LEO distributed jamming system, the reference points lie on a two-dimensional hyperplane. Each objective is divided into 10 parts, resulting in 55 reference points. The algorithm used to select jamming reference points is as follows:
  • Let X be a two-dimensional variable, taking values from the set 0 , 1 10 , , 11 10 .
  • For each x i j X (the j th element of the i th combination in X ), x i j = x i j j     1 10 .
  • Use S as the set of jamming reference points and obtain coordinates for each objective function:
    s i j = x i j 0 , j = 1 s i j = x i j x i j 1 , j = 2 s i j = 1 x i j 1 , j = 3 .

4.1.3. Adaptive Normalization of Population Individuals

Adaptive normalization is applied in the NSGA-III algorithm to normalize the objective function values of each individual. This helps to maintain a uniform distribution of solutions on the Pareto front. The basic steps for adaptive normalization are as follows:
  • Find the ideal point.
For each dimension of the objectives for individuals in the population S t , find the minimum values m i n f i x i = 1 , 2 , 3 to construct the jamming ideal point z ¯ = m i n P t o t a l , m i n τ i j k , m i n f i j k . Shift the population S t by f i x = f i x z i m i n i = 1 , 2 , 3 to bring the ideal point to the origin.
2.
Calculate extreme points and construct hyperplanes.
The jamming extreme points refer to points where one objective value is large while the others are small. The formula for generating jamming extreme points is as follows:
A S F x , ω = m a x f i x ω i , x S t ω i = τ , ω j i τ , τ = 10 6 , ω j i = 1 z i , m a x = s : a r g m i n s S t A S F x , ω
The lines connecting extreme points and ideal points form three extreme objective vectors z i , m a x i = 1 , 2 , 3 , constituting a 3D jamming hyperplane.
3.
Objective Adaptive Normalization.
The intersection points of the 3D jamming hyperplane and the axes of the power, time, and frequency domains are intercepts a i i = 1 , 2 , 3 . Normalization is carried out according to the following equation using these intercepts:
f i n x = f i x a i z i m i n = f i x z i m i n a i z i m i n ,   f o r   i = 1 , 2 , 3 .

4.1.4. Association Operation

The association operation involves associating individuals in the population with corresponding jamming reference points. The lines between the origin and reference points serve as reference lines. We calculate the distance from each individual in S t to each reference line and associate each individual with the reference line for which it has the shortest distance.

4.1.5. Individual Retention

During the process of individual selection, individuals with fewer associations with jamming reference points should be preserved to maintain diversity. The specific steps are as follows:
  • Select the jamming reference point J m i n with the least number of associations. If there are multiple such jamming reference points, randomly choose one J ¯ . I J ¯ represents the individuals associated with jamming reference point J ¯ in the F l layer.
  • If I J ¯ is empty, re-select the jamming reference point. If I J ¯ is not empty, check whether the number of associations ρ J ¯ in all non-dominated layers before F l with jamming reference point j is 0. If ρ J ¯ = 0 , select the individual with the minimum distance to J ¯ from I J ¯ for the next generation. If ρ J ¯ 0 , randomly choose an individual from I J ¯ for the next generation.
  • Repeat the operation until the size of the next generation equals N .

5. Experimental Analysis

Field tests were conducted in the southwest outskirts of Xi’an, China, using the LEO satellite downlink distributed jamming optimization method with non-dominated sorting genetic algorithm proposed in this article, targeting the LEO constellation of the China Satellite Network. The experimental area is illustrated in Figure 4.
The jamming equipment carrier and the onboard jamming equipment used in the experiments are illustrated in Figure 5.
The specific jamming parameters for the experiments are outlined in Table 1.
Three jamming scenarios were created:
  • The first scenario compares the target function with the optimal solution set;
  • The second scenario compares coverage optimization over time;
  • The third scenario compares the success rate of jamming within a certain region.

5.1. Objective Function and Optimal Solution Set Optimization

5.1.1. Objective Function Comparison

In the experimental testing of objective function optimization, the proposed third-generation non-dominated sorting genetic algorithm (NSGA-III) based on reference points for LEO satellite jamming was tested under the constraint of at least 90% jamming coverage. Subsequently, it was compared with the constraint-based dual-population evolutionary algorithm (c-DPEA), multi-task constraint multi-objective optimization algorithm (MTCMO), multi-strategy improved continuous explosive algorithm (MSCEA), and constraint-based multi-objective optimization algorithm utilizing unconstrained and constrained Pareto front relationships (URCMO). After 100 iterations, the multi-objective Pareto frontier sets for power, delay, and frequency compensation were obtained, as shown in Figure 6.
From Figure 6, it can be observed that the objective function values generated with the URCMO algorithm were scattered and did not converge to a stable Pareto frontier, while the other four algorithms all converged to a stable Pareto frontier, with the Pareto frontier generated with the MSCEA algorithm being relatively divergent. In terms of total jamming power, the NSGA-III algorithm optimization produced a jamming power of −125 dBm, while the jamming powers optimized with the MSCEA, c-DPEA, and MTCMO algorithms were all around −128 dBm, thus proving that the NSGA-III algorithm maximized the jamming power. Under similar total frequency compensation, the NSGA-III algorithm produced a smaller total delay compared to the other three algorithms, for instance, at a total relay delay of 1.2 μs with a total frequency compensation of 724 KHz for low-Earth-orbit constellations, while those of the other algorithms were all around 1.76 μs. Similarly, under a similar total delay, the NSGA-III algorithm produced smaller total frequency compensation compared to the other three algorithms; for example, at a total delay of 1.4 μs, a total frequency compensation of 695 KHz was obtained for low-Earth-orbit constellations, while those of the other algorithms were around 800 KHz, thereby demonstrating the effectiveness of the NSGA-III algorithm in optimizing in the power, time, and frequency domains for distributed jamming of the LEO satellites’ downlink.

5.1.2. Dominant Solution Set Comparison

The Feasible-Rate and Spread metrics were used to measure the feasibility and spread of the dominant solution set, respectively. Feasible-Rate assesses the proportion of solutions that satisfy all constraints and have variables within the upper and lower bounds among all generated solutions, where a higher Feasible-Rate indicates the better feasibility of the generated optimal solution set. Spread calculates the standard deviation of the distances between individuals that are farthest apart on each objective, where a larger Spread indicates a wider distribution of the algorithm’s generated solution set, making it less prone to local optima.
In the performance experiment regarding the solution set, under the same conditions as the objective function optimization test, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The Feasible-Rate and Spread values for the optimized dominant solution sets were obtained after testing, and they are shown in Figure 7 and Figure 8.
From Figure 7, it can be seen that the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms converged to a Feasible-Rate of 1 at the 27th, 42nd, 55th, 49th, and 72nd iterations, respectively. This indicates that the dominant solution sets generated with all five algorithms satisfied the constraints and had extremely high feasibility. Additionally, the NSGA-III algorithm converged faster than the other four algorithms.
Taking the example of the last 20 iterations when the dominant solution sets generated with all five algorithms satisfied the constraints (Feasible-Rate = 1), Figure 8 shows that the Spread values obtained with the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms were 1.157, 1.018, 1.036, 1.013, and 1.033, respectively. The NSGA-III algorithm produced the largest Spread, demonstrating the excellent spread of the dominant solution set generated with the NSGA-III algorithm when optimizing LEO satellite distributed jamming.
In summary, the feasibility, convergence, and spread of the dominant solution set generated with the NSGA-III algorithm were far superior to those of the other four algorithms. This confirms the strong overall performance of the NSGA-III algorithm in optimizing distributed jamming for LEO satellite constellations.

5.2. Coverage Optimization

Jamming coverage measures the degree to which key areas are covered by jamming beams. The proportion of ground users covered by jamming beams in a certain area was used as an indicator of jamming coverage. In the experiment testing jamming coverage optimization, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The changes in jamming coverage rates for the different optimization algorithms are plotted in Figure 9.
In Figure 9, it can be observed that the initial coverage rate of the NSGA-III algorithm was the highest (at 84%), while the URCMO algorithm had the lowest initial coverage rate (at 60%). With an increase in the number of iterations, the NSGA-III, MSCEA, c-DPEA, MTCMO, and URCMO algorithms reached jamming coverage rates of over 90% at the 21st, 32nd, 49th, 40th, and 60th iterations, respectively, satisfying the set jamming coverage rate constraint. At the end of the iterations, the coverage rate of the NSGA-III algorithm reached 100%; the coverage rates under the MSCEA, c-DPEA, and MTCMO algorithms were 96%; and the coverage rate of the URCMO algorithm was 92%. This demonstrates the efficiency of the NSGA-III algorithm in optimizing the jamming coverage rate in the context of LEO satellite downlink distributed jamming.

5.3. Jamming Success Rate Optimization

The jamming success rate is the core indicator of jamming optimization. The total receiver bit error rate in a certain area measured according to actual satellite signals was used to reflect the jamming success rate, where a higher bit error rate indicates a higher jamming success rate. In the experiment testing jamming success rate optimization, assuming that LEO satellites send a 1000-bit stream to ground users and under the constraint of at least 90% jamming coverage, the NSGA-III algorithm was tested first, followed by comparison with the c-DPEA, MTCMO, MSCEA, and URCMO algorithms. The changes in the bit error rates corresponding to different optimization algorithms are plotted in Figure 10.
From Figure 10, it can be observed that during the initial iterations, the NSGA-III algorithm produced the highest bit error rate, while the URCMO algorithm produced the lowest bit error rate. With an increase in the number of iterations, the bit error rate of the NSGA-III algorithm grew the most, surpassing the other four algorithms, while the bit error rate growth of the URCMO algorithm was the smallest. At the end of the iterations, the NSGA-III algorithm generated 102 bit errors; the c-DPEA and MTCMO algorithms produce 51 and 45 bit errors, respectively; the MSCEA algorithm produced 38 bit errors; and the URCMO algorithm produced only 24 bit errors. These results demonstrate the efficiency of the NSGA-III algorithm for optimizing the jamming success rate in distributed jamming of the LEO satellites’ downlinks.

6. Conclusions

This study aimed to prevent attacks on satellites by unauthorized ships in maritime scenarios, as well as activities such as illegal broadcasting in large sports stadiums or illegal leakage of military secrets in critical areas by taking advantage of the high transmission rate and low latency of LEO satellite communication systems, which pose serious threats to the national economy and security. In particular, a LEO satellite downlink distributed jamming optimization method using a non-dominated sorting genetic algorithm was proposed. Field jamming tests were conducted on the LEO constellation of the China Satellite Network in the southwest outskirts of Xi’an, China, and comparative experiments were performed against traditional jamming optimization methods, considering the objective functions, optimal solution sets, jamming coverage, and jamming success rates. The results indicated that under the condition of jamming coverage being no less than 90%, the proposed method outperformed the considered existing jamming optimization methods in terms of optimization in the power, time, and frequency domains, yielding a more extensive, scalable, and convergent solution set, thus effectively improving the real-time jamming performance and success rate. The method proposed in this article holds significant application value in both military and civilian security fields. In the future, we plan to conduct further research in order to explore its application in different communication jamming scenarios.

Author Contributions

Conceptualization, L.Z.; Software, L.Z.; Writing—original draft, J.D.; Writing—review & editing, C.T. All authors have read and agreed to the published version of the manuscript.

Funding

National Natural Science Foundation of China: 62171735, 62271397, 62173276, 62101458, 62001392, 61803310, 61801394; Natural Science Basic Research Program of Shaanxi: 2022GY-097, 2021JQ-122, 2021JQ-693; Shenzhen Science and Technology Program: JCYJ20220530161615033.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Lin, Z.; Niu, H.; An, K.; Wang, Y.; Zheng, G.; Chatzinotas, S.; Hu, Y. Refracting RIS-aided hybrid satellite-terrestrial relay networks: Joint beamforming design and optimization. IEEE Trans. Aerosp. Electron. Syst. 2022, 58, 3717–3724. [Google Scholar] [CrossRef]
  2. Lin, X.; Cioni, S.; Charbit, G.; Chuberre, N.; Hellsten, S.; Boutillon, J.-F. On the path to 6G: Embracing the next wave of low Earth orbit satellite access. IEEE Commun. Mag. 2021, 59, 36–42. [Google Scholar] [CrossRef]
  3. Yue, P.; An, J.; Zhang, J.; Ye, J.; Pan, G.; Wang, S.; Xiao, P.; Hanzo, L. Low earth orbit satellite security and reliability: Issues, solutions, and the road ahead. IEEE Commun. Surv. Tutor. 2023, 25, 1604–1652. [Google Scholar] [CrossRef]
  4. An, K.; Lin, M.; Ouyang, J.; Zhu, W.-P. Secure transmission in cognitive satellite terrestrial networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  5. An, K.; Liang, T.; Zheng, G.; Yan, X.; Li, Y.; Chatzinotas, S. Performance limits of cognitive-uplink FSS and terrestrial FS for Ka-band. IEEE Trans. Aerosp. Electron. Syst. 2018, 55, 2604–2611. [Google Scholar] [CrossRef]
  6. Lin, Z.; Lin, M.; Champagne, B.; Zhu, W.-P.; Al-Dhahir, N. Secure and energy efficient transmission for RSMA-based cognitive satellite-terrestrial networks. IEEE Wirel. Commun. Lett. 2020, 10, 251–255. [Google Scholar] [CrossRef]
  7. Monzon Baeza, V.; Ortiz, F.; Herrero Garcia, S.; Lagunas, E. Enhanced Communications on Satellite-Based IoT Systems to Support Maritime Transportation Services. Sensors 2022, 22, 6450. [Google Scholar] [CrossRef]
  8. Alrefaei, F.; Alzahrani, A.; Song, H.; Alrefaei, S. A survey on the jamming and spoofing attacks on the unmanned aerial vehicle networks. In Proceedings of the 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 1–4 June 2022; pp. 1–7. [Google Scholar]
  9. Shi, Q.; Wang, Y.; Wang, C.; Feng, Q.; Yuan, N. A novel deceptive and blanket joint jammer. In Proceedings of the 2017 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC), Xiamen, China, 22–25 October 2017; pp. 1–4. [Google Scholar]
  10. Yang, Z.; Zhang, B.; Zhang, K.; Shi, J.; Li, Z.; Huang, C.; Zhou, Q. Efficient Waveform Design with Jamming Characteristics for Precision Electronic Warfare. Signal Process. 2023, 212, 109162. [Google Scholar] [CrossRef]
  11. Pärlin, K.; Riihonen, T.; Le Nir, V.; Bowyer, M.; Ranstrom, T.; Axell, E.; Asp, B.; Ulman, R.; Tschauner, M.; Adrat, M. Full-duplex tactical information and electronic warfare systems. IEEE Commun. Mag. 2021, 59, 73–79. [Google Scholar] [CrossRef]
  12. Meng, L.; Yang, L.; Yang, W.; Zhang, L. A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote Sens. 2022, 14, 4826. [Google Scholar] [CrossRef]
  13. Wu, Z.; Zhang, Y.; Yang, Y.; Liang, C.; Liu, R. Spoofing and anti-spoofing technologies of global navigation satellite system: A survey. IEEE Access 2020, 8, 165444–165496. [Google Scholar] [CrossRef]
  14. Tedeschi, P.; Sciancalepore, S.; Di Pietro, R. Satellite-based communications security: A survey of threats, solutions, and research challenges. Comput. Netw. 2022, 216, 109246. [Google Scholar] [CrossRef]
  15. Ni, S.; Cui, J.; Cheng, N.; Liao, Y. Detection and elimination method for deception jamming based on an antenna array. Int. J. Distrib. Sens. Netw. 2018, 14, 1550147718774466. [Google Scholar] [CrossRef]
  16. Wang, H.; Chang, Q.; Xu, Y. Deception jamming detection based on beam scanning for satellite navigation systems. IEEE Commun. Lett. 2021, 25, 2703–2707. [Google Scholar] [CrossRef]
  17. Meggs, R.; Watson, R. Spoofing and Jamming of GNSS Signals: Are They Real and What Can We Do about Them? In Proceedings of the Conference Proceedings of iSCSS, Delft, The Netherlands, 6–8 October 2020. [Google Scholar]
  18. Wang, P.; Lu, X.; Wang, R. Research on Blanket Jamming to Beidou Navigation Signals Based on BOC Modulation. Int. J. Commun. Netw. Syst. Sci. 2016, 9, 135–144. [Google Scholar] [CrossRef]
  19. Xu, R.; Hu, Y.H.; Zhang, T.; Zhang, F. Research on Effect of Blanket Jamming on GNSS Signal. Adv. Mater. Res. 2014, 846, 956–961. [Google Scholar] [CrossRef]
  20. Silva Lorraine, K.J.; Ramarakula, M. A comprehensive survey on GNSS interferences and the application of neural networks for anti-jamming. IETE J. Res. 2023, 69, 4286–4305. [Google Scholar] [CrossRef]
  21. Dovis, F. GNSS Interference Threats and Countermeasures; Artech House: Sydney, NSW, Australia, 2015. [Google Scholar]
  22. Garcia-Pena, A.; Julien, O.; Macabiau, C.; Mabilleau, M.; Durel, P. GNSS degradation model in presence of continuous wave and pulsed interference. Navigation 2021, 68, 75–91. [Google Scholar] [CrossRef]
  23. Qiao, J.; Lu, Z.; Lin, B.; Song, J.; Xiao, Z.; Wang, Z.; Li, B. A survey of GNSS interference monitoring technologies. Front. Phys. 2023, 11, 1133316. [Google Scholar] [CrossRef]
  24. Lei, Z.; Ding, P.; Zheng, W.; Fei, X.; Fan, H. UAV Countermeasure Technology Based on Partial-band Noise Jamming. In Proceedings of the 2021 33rd Chinese Control and Decision Conference (CCDC), Kunming, China, 22–24 May 2021; pp. 1456–1461. [Google Scholar]
  25. Karpe, R.V.; Kulkarni, S. Software defined radio based global positioning system jamming and spoofing for vulnerability analysis. In Proceedings of the 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, 2–4 July 2020; pp. 881–888. [Google Scholar]
  26. Wang, Z.; Wang, H.; Cao, N. Research on Spoofing Jamming of Integrated Navigation System on UAV. In Proceedings of the Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, 19–23 July 2021; pp. 3–13. [Google Scholar]
  27. Li, X.; Chen, L.; Lu, Z.; Wang, F.; Liu, W.; Xiao, W.; Liu, P. Overview of Jamming Technology for Satellite Navigation. Machines 2023, 11, 768. [Google Scholar] [CrossRef]
  28. Youda, W.; Pengcheng, M.A.; Junwei, N.; Guangfu, S. Study of Multi-Station Retransmission Spoofing Methods Based on Protection of Fixed Target. GNSS World China 2016, 41, 60–65. [Google Scholar]
  29. Tang, C.; Ding, J.; Qi, H.; Zhang, L. Smart forwarding deceptive jamming distribution optimal algorithm. IET Radar Sonar Navig. 2024, 1–12. [Google Scholar] [CrossRef]
  30. Wang, Y.; Sun, F.; Wang, X.; Hao, J.; Xiao, K. Full-domain collaborative deployment method of multiple interference sources and evaluation of its deployment effect. Def. Technol. 2023, 32, 572–595. [Google Scholar] [CrossRef]
  31. Hao, Z.; Wang, X.; Wang, J. A Study of Jamming Resource Allocation Based on a Hyperheuristic Framework. Res. Sq. 2022; preprint. [Google Scholar] [CrossRef]
  32. Fang, F.; Chunming, Y.; Haibo, L. Jammer Placement Algorithm Based on Particle Swarm Optimization. J. Syst. Simul. 2019, 31, 1101–1110. [Google Scholar] [CrossRef]
  33. Xinxin, Z.; Chengjun, G.; Yawen, C. Optimal Design of Interference Source Based on Ant Colony Algorithm. GNSS World China 2017, 42, 20. [Google Scholar] [CrossRef]
  34. Luo, Z.; Deng, M.; Yao, Z.; Leng, X.; Chen, Y. Distributed blanket jamming resource scheduling for satellite navigation based on particle swarm optimization and genetic algorithm. In Proceedings of the 2020 IEEE 20th International Conference on Communication Technology (ICCT), Nanning, China, 28–31 October 2020; pp. 611–616. [Google Scholar]
  35. Ye, F.; Che, F.; Gao, L. Multiobjective Cognitive Cooperative Jamming Decision-Making Method Based on Tabu Search-Artificial Bee Colony Algorithm. Int. J. Aerosp. Eng. 2018, 2018, 7490895. [Google Scholar] [CrossRef]
  36. Qingwen, Q.; Wenfeng, D.; Meiqing, L.; Yang, Y. Cooperative jamming resource allocation of UAV swarm based on multi-objective DPSO. In Proceedings of the 2018 Chinese Control and Decision Conference (CCDC), Shenyang, China, 9–11 June 2018; pp. 5319–5325. [Google Scholar]
  37. Maseng, T.; Bakken, P. A Stochastic Dynamic Model of Rain Attenuation. IEEE Trans. Commun. 1981, 29, 660–669. [Google Scholar] [CrossRef]
  38. Baeza, V.M.; Lagunas, E.; Al-Hraishawi, H.; Chatzinotas, S. An Overview of Channel Models for NGSO Satellites. In Proceedings of the 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall), London, UK, 26–29 September 2022; pp. 1–6. [Google Scholar]
Figure 1. Topological structure of the LEO satellite downlink distributed jamming system.
Figure 1. Topological structure of the LEO satellite downlink distributed jamming system.
Remotesensing 16 01006 g001
Figure 2. Jamming resource allocation system.
Figure 2. Jamming resource allocation system.
Remotesensing 16 01006 g002
Figure 3. NSGA-III algorithm flowchart.
Figure 3. NSGA-III algorithm flowchart.
Remotesensing 16 01006 g003
Figure 4. Experimental test site map.
Figure 4. Experimental test site map.
Remotesensing 16 01006 g004
Figure 5. Experimental equipment.
Figure 5. Experimental equipment.
Remotesensing 16 01006 g005
Figure 6. Pareto frontiers generated with different optimization algorithms.
Figure 6. Pareto frontiers generated with different optimization algorithms.
Remotesensing 16 01006 g006
Figure 7. Feasible-Rate generated with different optimization algorithms.
Figure 7. Feasible-Rate generated with different optimization algorithms.
Remotesensing 16 01006 g007
Figure 8. Spread values generated with different optimization algorithms.
Figure 8. Spread values generated with different optimization algorithms.
Remotesensing 16 01006 g008
Figure 9. Variation curve of jamming coverage rates for different optimization methods.
Figure 9. Variation curve of jamming coverage rates for different optimization methods.
Remotesensing 16 01006 g009
Figure 10. Variation curves for jamming coverage rates using different optimization methods.
Figure 10. Variation curves for jamming coverage rates using different optimization methods.
Remotesensing 16 01006 g010
Table 1. Jamming scene parameter settings.
Table 1. Jamming scene parameter settings.
ParameterValue
LEO Satellite Frequency Bands37.5–42.5 GHz
Altitude of LEO Satellites900 km
Number of Visible LEO Satellites11
Number of Jammers20
Altitude of Jammers10–20 km
Jamming Radius20 km
Area Size 20   k m × 20   k m
Number of Target Central Points25
Population Size1000
Maximum Iteration Count100
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Tang, C.; Ding, J.; Zhang, L. LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm. Remote Sens. 2024, 16, 1006. https://doi.org/10.3390/rs16061006

AMA Style

Tang C, Ding J, Zhang L. LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm. Remote Sensing. 2024; 16(6):1006. https://doi.org/10.3390/rs16061006

Chicago/Turabian Style

Tang, Chengkai, Jiawei Ding, and Lingling Zhang. 2024. "LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm" Remote Sensing 16, no. 6: 1006. https://doi.org/10.3390/rs16061006

APA Style

Tang, C., Ding, J., & Zhang, L. (2024). LEO Satellite Downlink Distributed Jamming Optimization Method Using a Non-Dominated Sorting Genetic Algorithm. Remote Sensing, 16(6), 1006. https://doi.org/10.3390/rs16061006

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop