Skip to main content
. 2019 Sep 7;19(18):3870. doi: 10.3390/s19183870
Algorithm 1 Multiple Interference Suppression Scheme
Jamming Suppression
Input: x(nTs)
  • (1)

    Estimate the spatial covariance matrix R^x=1Kk=0K1x(kTs)xH(kTs).

  • (2)

    Compute the EVD of R^x, and obtain the jamming subspace VJ and its orthogonal subspace PJ.

  • (3)

    Project the received signal onto the jamming-free subspace y(nTs)=PJx(nTs).

Output: y(nTs),PJ,MJ
Spoofing Detection and Mitigation
Input: y(nTs),PJ,MJ
  • (1)

    Estimate the cyclic correlation matrix by Equation (28).

  • (2)

    Compute the EVD of R^yc and obtain the eigenvalues and eigenvectors of the signal subspace λ^i,u^i(i=1,,d^).

  • (3)

    Compute the test statistic Tsse based on the CCET algorithm.

  • (4)

    Decision. If Tsse>η, then the spoofing signals exist; otherwise, there is no spoofing signal.

  • (5)

    Estimate the spoofing steering vector b^S and the authentic steering vectors b^iA(i=1,,d^1) by the Cyclic MUSIC algorithm.

  • (6)

    Compute the array weight vector for each satellite signal wiH=(b^iA)HPS (under H1) or wiH=(b^iA)H (under H0)

  • (7)

    Obtain the output signal zi(nTs)=wiHy(nTs)

Output: zi(nTs)