IET International Radar Conference 2015 2015
DOI: 10.1049/cp.2015.0999
|View full text |Cite
|
Sign up to set email alerts
|

Research on GNSS generating spoofing jamming technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 0 publications
0
0
0
Order By: Relevance
“…Compared with suppressive jamming, deceptive jamming does not affect the transmission of other signals because it can achieve smart jamming of the target with tactical support. There are two kinds of deceptive jamming, generative and forwarding, by giving false messages or changing signal propagation delay time, causing a change in the observed pseudorange thereby achieving false localization, respectively [9][10][11][12]. Deceptive jamming as a smart jamming has high power utilisation efficiency, and to convert this energy advantage into an advantage in countermeasures, it is necessary to start with the realistic mapping area or trajectory of the real target.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with suppressive jamming, deceptive jamming does not affect the transmission of other signals because it can achieve smart jamming of the target with tactical support. There are two kinds of deceptive jamming, generative and forwarding, by giving false messages or changing signal propagation delay time, causing a change in the observed pseudorange thereby achieving false localization, respectively [9][10][11][12]. Deceptive jamming as a smart jamming has high power utilisation efficiency, and to convert this energy advantage into an advantage in countermeasures, it is necessary to start with the realistic mapping area or trajectory of the real target.…”
Section: Introductionmentioning
confidence: 99%