2016
DOI: 10.33012/2016.14689
|View full text |Cite
|
Sign up to set email alerts
|

Jammer Localization: From Crowdsourcing to Synthetic Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
27
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(27 citation statements)
references
References 7 publications
0
27
0
Order By: Relevance
“…The performance of locating a jamming source is analyzed by the following metrics: the correct localization rate, the average localization error, and the judgment accuracy to the motion state of the jammer. The performance is also compared with the C/N 0 variation model method proposed by Borio et al The C/N 0 variation model method is also a network‐based jamming localization method that uses C/N 0 as the monitoring metric. It utilizes a classical log‐normal shadowing loss model as a general model to estimate the signal transmitting loss in different environments.…”
Section: Results and Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The performance of locating a jamming source is analyzed by the following metrics: the correct localization rate, the average localization error, and the judgment accuracy to the motion state of the jammer. The performance is also compared with the C/N 0 variation model method proposed by Borio et al The C/N 0 variation model method is also a network‐based jamming localization method that uses C/N 0 as the monitoring metric. It utilizes a classical log‐normal shadowing loss model as a general model to estimate the signal transmitting loss in different environments.…”
Section: Results and Analysismentioning
confidence: 99%
“…This parameter is widely used as a metric for interference detection but seldom used for interference localization. Borio et al proposed a method that estimates the localization of interference based on the model of the effective C/N 0 variation with the distance between the interference source and the monitoring node . The model is established by combining the C/N 0 versus interference power model and the log‐normal shadowing model.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…By using the PVT results and the C/N 0 from the crowd-sourced, the possibility of detecting and localizing the source of the jammer was demonstrated in [17,51]. In those studies, the information (i.e., C/N 0 ) is extracted from the GNSS receiver embedded in smartphone.…”
Section: Ngeneapp: An Android-based Real Time Rfi Detector For Smamentioning
confidence: 99%
“…We can see that all the PRNs which have C/N 0 in the same range can use the same reference distribution without significant effect on the algorithm. For example, signals in the range [48,49,50,51,52,53,54,55,56,57,58,59] dBHz (e.g., PRN 1, PRN 5, PRN 6 and PRN 10) could use the reference distribution of PRN 5 with limited false alarm rate. However, from the table, we can also realize that the lower the C/N 0 value, the higher the false alarm rate.…”
Section: In-laboratory Tests and Calibrationsmentioning
confidence: 99%