Abstract:
Systems and methods for GNSS anti-jamming using interference cancellation are described herein. In certain embodiments, a system includes an antenna that receives signals, wherein the signals comprise a weak portion associated with one or more GNSS satellites and a strong interference portion from an interfering signal source. The system also includes a GNSS anti-jammer. The GNSS anti-jammer includes an interference isolator that receives the received signals and provides an estimated strong interference portion as an output. The GNSS anti-jammer also includes a summer that subtracts the estimated strong interference portion from the received signals to create a summed signal. Further, the GNSS anti-jammer includes a local noise remover that removes noise generated by the interference isolator from the summed signal, wherein the local noise remover is a processor that digitally removes the noise. Further, the system includes a GNSS receiver coupled to receive the summed signal from the processor.
Abstract:
A technique for tamper protection of incoming data signal to an electronic device is disclosed. An intentional interference signal is generated and modulated onto the incoming data signal as one composite input signal, to prevent unauthorized acquisition of valid data from the incoming data signal. The magnitude of the interference signal is adjusted to correspond to the magnitude of the incoming data signal, thereby preventing an attacker from properly differentiating the two different signals and/or decoding the valid data from the composite input signal. Once the composite input signal is safely received within the device, the interference signal can be filtered out in either analog mode or digital mode.
Abstract:
A method and apparatus for improving anti-jamming performance are provided. A threshold value level estimated in a GPS (global positioning system) receiver RF/IF stage, a threshold value weight, a median value of a median value of a 2˜8 MHz bandwidth is estimated as a threshold value with respect to a frequency component exceeding the estimated threshold value level, and an adjustable K-median threshold scheme is provided in a multi-jamming environment.
Abstract:
A signal is detected and an unwanted jamming signal is removed from the detected signal. Respective first, second and third correlations between a received signal and signals at first, second and third frequencies are determined over a plurality of taps. The second frequency is higher than the first frequency and lower than the third frequency, and is equally spaced from the first and third frequencies. The second frequency is adapted to a frequency of the received signal such that peaks in the first and third correlations after corresponding adaptation of the first and third frequencies have substantially equal magnitudes. A difference is determined between non-peak magnitudes of the first and third correlations; and at least one of the correlations is compensated for the effects of the jamming signal, based on said difference.
Abstract:
Modulated orthogonal frequency division multiplexing (OFDM) subcarriers generate high sidelobes, resulting in adjacent channel interference (ACI). Current sidelobe suppression techniques, such as inserting guard intervals or cancellation carrier bands, diminish the useful radio spectrum or consume significant wireless device resources. Disclosed is a method of suppressing sidelobes through adding an adaptive extension to OFDM symbols that is calculated to avoid ACI while keeping power consumption to low levels. Bandwidth and user location information are collected by a cognitive radio an utilized to determine the extension used. The method significantly reduces ACI to other bands and reduces the required guard bands, opening the radio spectrum to more efficient use.
Abstract:
A method for detecting and removing spoofing signals may include receiving, by a navigation or communications device, a radio frequency (RF) signal and performing an anti-spoofing assessment to detect a presence of a spoofing signal associated with the RF signal. The method may additionally include generating a replica of the spoofing signal in response to the spoofing signal being detected and subtracting the replica of the spoofing signal from the RF signal to provide a residual non-spoofed signal. The method may further include decoding the residual non-spoofed signal by the navigation or communications device.
Abstract:
A geolocation device is disclosed. In one aspect, the geolocation device is adapted for receiving first radioelectric positioning signals from satellites. Each first signal has a first frequency and is generated from a first code specific to the satellite, from which stems the first signal. The device includes a first antenna configured to receive a geolocation signal, and a processing unit configured to determine a piece of positioning information of the device according to the geolocation signal which the first antenna is configured to receive. The device also includes a second antenna configured to emit at least one second signal, each second signal either being an emitted jamming signal, or an emitted spoofing signal and having a jamming or spoofing frequency spectrum including at least one of the first frequencies.
Abstract:
A technique for tamper protection of incoming data signal to an electronic device is disclosed. An intentional interference signal is generated and modulated onto the incoming data signal as one composite input signal, to prevent unauthorized acquisition of valid data from the incoming data signal. The magnitude of the interference signal is adjusted to correspond to the magnitude of the incoming data signal, thereby preventing an attacker from properly differentiating the two different signals and/or decoding the valid data from the composite input signal. Once the composite input signal is safely received within the device, the interference signal can be filtered out in either analog mode or digital mode.
Abstract:
A system and method are disclosed for autonomous authentication of a received signal based on characteristics of the signal. The method receives, acquires and tracks a signal to first determine if a carrier clock phase variable associated with the signal meets a phase consistency threshold. If so, the signal is labeled authentic and configured for output to a positioning system. Second and optionally, the system may determine if a data set measurement associated with a unique satellite identification of the signal meets a data set threshold. If not, the signal is labeled as inconsistent and discarded. The system and method continuously monitors the signal for consistency as well as authenticity based on the data set threshold and the phase consistency threshold. Should any tracked signal fall below either threshold, the signal is discarded from the possible positioning solution.
Abstract:
An apparatus to process an input signal received via a power line in a power line communication system includes a jammer remover and a jammer detector. The jammer remover removes interference resulting from transmission of electricity and the input signal over the power line from the input signal. The jammer remover generates a jammer-canceled signal using an adaptive filtering procedure. The jammer detector is coupled to the jammer remover to detect the interference.