Page 205 - 卫星导航2021年第1-2合期
P. 205

Wang et al. Satell Navig             (2021) 2:4                                        Page 5 of 9









































              Fig. 5  Schematic diagram of using data-channel signal authentication


            where ω o  is the frequency of the local carrier, ϕ o,d  is the   When the receiver tracks pilot signal and data sig-
            initial phase of the local carrier, and  n i,d  ,  n q,d  are the   nal independently, the above two methods are directly
            noises of the I and Q channels, respectively.     combined to get the normalized detection value V as
              Equation  (9) tells that to use the data channel for
            authentication, it is necessary to eliminate the infuence   V = V i + V q                   (18)
            of data bits. First, the Q channel signal in Eq. (15) is cor-  While if the receiver tracks pilot signal and data signal
            related and integrated with the data channel spreading   jointly,  it  is  necessary  to  determine  the  phase  relation
            code c d  and the phase hopping sequence c(k) respectively.   between V i and V q according to the practical tracking
            Te higher-order components will be cleared after the   loop and make a right combination.
            flter in the authentication module. Ten the infuence   To use the above three methods, we only need to add
            of data bit inversion is eliminated according to the data   an identity authentication module in the classic tracking
            bit estimation of the I channel. Next, to further improve   loop. Table 1 shows the increase in hardware complexity,
            C N  , a coherent accumulation for the length of T coh  is   which is mainly refected in the number of code sequence

                0
            carried out, and the normalized detection value V q is  generators and correlators.

                V q = − P r2 (ϕ PH · π/180)             (16)
                                                              Performance analysis
            when θ is small, sin θ ≈ θ . Te threshold value V t  is  In order to verify the performance of the binary phase
                                                              hopping based SCA technique, this paper simulates the

                V t = σ n  −2 ln P fa                   (17)  performance loss and detection probability, then com-
                                                              pares it with the inserting chip based SCA technique. It is
            where σ n  is the standard deviation of the noise, and P fa  is   assumed that the energy proportion of the authentication
            false alarm probability. If V q is higher than V t  , the authen-  part is the same, i.e., (sin ϕ PH ) .
                                                                                      2
            tication successes, otherwise fails.

              3.  Both data and pilot channels used for authentication
   200   201   202   203   204   205   206   207   208   209   210