Keywords

1 Introduction

The SQM (signal quality monitoring) is an important indicator to detect the normal orbiting satellites, and the normal orbiting satellites also occur subtle distortion [1]. As a result, the cross-correlation function curve of the local signal and the ground receiving signal will be deteriorated, and the zero crossings of the S curve will occur move, thus causing ranging error [2]. The failure of the satellite payload in the satellite navigation system will lead to distortion of the navigation signal, thus affecting the user’s ranging performance [2]. Since 1997 GPS-SV19 satellite failure, the satellite signal failure model analysis has drawn people’s attention [3,4,5]. The foreign scholars Alexanhder Michael Miteman, Robert Eric Phelts, P Enge and soon on, have studied the evil signal model in dept [5]. The most typical research about the chip distortion model is the 2nd-order step (2OS) model proposed by Robert Eric Phelts. The model summarizes three possible fault signal models: TMA (digital distortion), TMB (analog distortion), and TMC (mixed distortion) [3, 5]. ICAO Annex 10 sets the parameters of the 2OS distortion model for GPS and GLONASS navigation signal [5]. For GPS and GLONASS systems, chip distortion model has been quite successful, qualitative and quantitative analysis have achieved remarkable results. In this paper, the digital threat and analog threat models in the 2nd-order step (2OS) model are introduced, and the analog threat model is introduced in detail. The second section introduces the chip extraction method, from the collection of raw data to the finally selected optimized chip. The third section is based on the 2nd-order step (2OS) model, the analog threat model of the measured BDS signal is established, and the two-dimensional accurate search method is proposed to obtain the precise parameter values of the simulation distortion. In the fourth section, the measured signals and the simulated signals with determined parameters in the third section are respectively used for verification. The locking points bias are given. It is further confirmed that the method to determine the simulated distortion parameters in Step 3 is feasible and effective. In conclusion, the determination of the simulated distortion parameters plays a supporting role in the signal quality assessment and has important reference significance for the BDS signal analysis.

2 2OS (2nd-Order Step)

2.1 Digitial Threat (TMA)

Digital threat occurs inside the NDU (navigation data unit), independent analog threat, this failure as either an advance or delay in the falling edge of C/A code chip [3], the positive and negative chip waveform width inconsistencies, correlation peak expansion [2, 6]. This kind of distortion mode generates the dead-zones in the correlation peak. Figure 1 depicts a delay of 0.3 chips of a chip period, and its effect on the correlation peak like Fig. 2. We can be get from the Figs. 12, the chip is delayed (or advanced), the correlation curves also translates entirely backwards or forwards, and the correlation peak shows a dead-zones. The proposed range of single TMA parameter ∆, is ±0.12 of a code chip, since larger values produce waveforms that are easily detectable by multi-correlation signal quality monitors [6]. At present, a great deal of research has been done on the current BDS digital threat, so this article only briefly introduces and the follow-up no longer discussed in detail.

Fig. 1
figure 1

Digital threat model

Fig. 2
figure 2

Analog threat model

2.2 Analog Threat (TMB)

Analog threat (TMB) occurs in the satellite analog payload module, which is mainly caused by the on-board transmitter baseband filtering or radio frequency filtering anomaly [2]. As shown in Fig. 3, analog threat waveform like the amplitude modulation and ringing joint effect, independent of digital threat module [3]. The expression is the jitter of the time-domain chip waveform, the distortion of the correlation peak, left-right asymmetry, etc. [3, 5]. The analog threat signal can be regarded as the response of the ideal signal after passing through the second-order filter [3]. The mathematical expression is as follows:

Fig. 3
figure 3

Analog threat correlation curve with different parameters

$$ {\text{e}}\left( {\text{t}} \right) = \left\{ {\begin{array}{*{20}l} 0 \hfill & {{\text{t}} < 0} \hfill \\ {1 - \exp \left( { -\upsigma{\text{t}}} \right)\left[ {{ \cos }\upomega_{\text{d}} {\text{t}} + \frac{\upsigma}{{\upomega{\text{d}}}}{ \sin }\upomega_{\text{d}} {\text{t}}} \right]} \hfill & {{\text{t}} \ge 0} \hfill \\ \end{array} } \right. $$
(1)

From the above equation, the corresponding impulse response function is:

$$ {\text{h}}_{{\left( {\upsigma,{\text{f}}_{\text{d}} } \right)}} \left( {\text{t}} \right) = \frac{{\upsigma^{2} +\upomega_{\text{d}}^{2} }}{{\upomega_{\text{d}} }}{\text{e}}^{{ -\upsigma{\text{t}}}} \sin \left( {\upomega_{\text{d}} } \right){\text{u}}\left( {\text{t}} \right) $$
(2)

TMB signal that is:

$$ {\text{x}}_{\text{TMB}} \left( {\text{t}} \right) = {\text{x}}_{\text{nom}} \left( {\text{t}} \right)\; * \;{\text{h}}_{{\left( {\upsigma,{\text{f}}_{\text{d}} } \right)}} \left( {\text{t}} \right) $$
(3)

among them:

$$ \upomega_{\text{d}} = 2\uppi{\text{f}}_{\text{d}} ,{\text{x}}_{\text{nom}} \left( {\text{t}} \right){\text{is ideal signal;}} $$

From Fig. 2 and Eq. (1), When σ is constant, the larger the \( {\text{f}}_{\text{d}} \) is, the higher the dithering frequency of the waveform is. When \( {\text{f}}_{\text{d}} \) is constant, the larger the \( \upsigma \) is, the faster the waveform attenuation tends to the amplitude of the chip; thus, \( {\text{f}}_{\text{d}} \) affects the oscillation frequency of the waveform, While δ affects the oscillation amplitude of the waveform [3]. The second-order step (2OS) model proposed by Robert Eric Phelts gives the specific parameter values under different navigation system and threat models in detail. We can get from Table 1, For TMB, \( {\text{f}}_{\text{d}} \) range from 4 to 17 MHz, and σ ranges from 0.8 to 8.8 M/s. \( {\text{f}}_{\text{d}} \) only extends as low as 4 MHz since lower frequencies would impact the military signal (P(Y)code), which is more closely monitored than the C/A code. Frequencies above 17 MHz would be difficult for the satellite signal hardware to generate. A lower σ would unrealistically result in unstable oscillations on the code chips, larger values of σ would not introduce additional constraints on the avionics since this would future attenuate the oscillations [6].

Table 1 .

2.3 Analog Threat Model Correlation Function

The correlation function of analog threat is written as R(τ), TMB threat model:

$$ \begin{aligned} & \frac{{\partial {\text{R}}\left(\uptau \right)}}{{\partial\uptau}} = {\text{u}}\left( {\uptau + {\text{T}}_{\text{c}} } \right) - 2{\text{u}}\left(\uptau \right) + {\text{u}}\left( {\uptau - {\text{T}}_{\text{c}} } \right) \\ & {\text{h}}_{{2{\text{nd}}}} \left( {\text{t}} \right) *\frac{{\partial {\text{R}}\left(\uptau \right)}}{{\partial\uptau}} = {\text{e}}\left( {\uptau + {\text{T}}_{\text{c}} } \right) - 2{\text{e}}\left(\uptau \right) + {\text{e}}\left( {\uptau - {\text{T}}_{\text{c}} } \right) \\ \end{aligned} $$
(4)

Analog threat correlation peak function as follows:

$$ {\text{R}}\left( {\uptau,\upsigma , {\text{f}}_{\text{d}} } \right) = {\text{h}}_{{2{\text{nd}}}} \left( {\uptau,\upsigma,{\text{f}}_{\text{d}} } \right)\; * \;{\text{R}}\left(\uptau \right) = {\text{E}}\left| {\begin{array}{*{20}c} {\uptau + {\text{T}}_{\text{c}} } \\ 0 \\ \end{array} - 2{\text{E}}} \right|\begin{array}{*{20}c}\uptau \\ 0 \\ \end{array} + {\text{E}}|\begin{array}{*{20}c} {\uptau - {\text{T}}_{\text{c}} } \\ 0 \\ \end{array} $$
(5)

And E(t) is one-order response;

$$ {\text{E}}\left( {\text{t}} \right) = \int_{0}^{\text{t}} {{\text{e}}\left(\upalpha \right)} {\text{d}}\upalpha = \left\{ {\begin{array}{*{20}l} 0 \hfill & { {\text{t}} \le 0} \hfill \\ {{\text{t}} - \frac{{2\upsigma}}{{\upsigma^{2} +\upomega_{\text{d}}^{2} }} + \frac{{{ \exp }\left( { -\upsigma{\text{t}}} \right)}}{{\upsigma^{2} +\upomega_{\text{d}}^{2} }}\left[ {2\upsigma \upomega _{\text{d}} {\text{t}} + \left( {\frac{{\upsigma^{2} }}{{\upomega_{\text{d}} }} -\upomega_{\text{d}} } \right){ \sin }\upomega_{\text{dt}} } \right]} \hfill & {{\text{t}} \ge 0} \hfill \\ \end{array} } \right. $$
(6)

Analog threat correlation curve is affected by the sine and cosine function at the same time, which directly leads to the jitter and asymmetry of the correlation curve [3]. As shown in the Fig. 3, the correlation curves under different σ and \( {\text{f}}_{\text{d}} \) parameters are simulate respectively. The smaller the \( {\text{f}}_{\text{d}} \) is, the smaller the frequency of the relevant curve jitter is. When \( {\text{f}}_{\text{d}} \) is constant, the smaller σ is, the smaller the jitter amplitude of the correlation curve is.

3 Optimal Chip Extraction

Using the 40-m large aperture antenna to obtain the original BDS signal data with high signal-to-noise ratio and low multipath interference. Firstly, use the software receiver to process the raw data to obtain the baseband signal Fig. 4a. Then, the baseband signal is processed with the averaging processing method, we can see that the baseband waveform amplitude envelope significantly neat. Figure 4c shown take the standard chip-correlation technology (signal waveform and code impulse sequence related) [7] to process the signal shown in Fig. 4b for chip recovery. Figure 4d shown the enlarged view of Fig. 4c. Figure 5 shows the optimized symbols extracted.

Fig. 4
figure 4

Chip extraction process

Fig. 5
figure 5

Optimized symbol waveforms

4 Analog Distortion Model Parameters to Determine the Method

As shown in Fig. 5, the decay trend of the envelope curve is σ, and the difference between adjacent wave peaks is \( {\text{f}}_{\text{d}} \). In order to obtain the initial values of σ and \( {\text{f}}_{\text{d}} \), we first extract the special points such as the peak and trough of the optimal chip waveform. Then, the extracted data are fixed function interpolation fitting. According to the result of the fitting curve envelope, we obtain initial value about σ and \( {\text{f}}_{\text{d}} \). In order to get more accurately estimate σ and \( {\text{f}}_{\text{d}} \), the chart of the program structure is proposed as follows Fig. 6. After the pre-processing obtains the initial values of σ and \( {\text{f}}_{\text{d}} \), the σ and \( {\text{f}}_{\text{d}} \) with 1000 Hz step search respectively. Based the mean of difference between the actual signal chip and ideal signal, the minimum mean difference is the needed ideal waveform, and the corresponding σ and \( {\text{f}}_{\text{d}} \) is finally determined precise parameter values. Figure 7 shown the minimum mean difference between the ideal signal and the actual signal chip waveform, we can see a good fit.

Fig. 6
figure 6

Two-dimensional search flow chart

Fig. 7
figure 7

Ideal and measured signal fitting plots

5 Ranging Performance

As shown in Fig. 3, Analog threat will produce the correlation curve fluctuation, jitter and lead to the left-right asymmetry situation, directly produce the ranging error. Ideally, the zero crossings of the receiver’s loop phase curve (S-curve), code ring lock points, should be at a code loop tracking error of 0 [5]. Due to the influence of analog threat, the lock phase of the code phase detection phase will shift. Set the lead- lag correlator interval is d, the corresponding S-curve expression is:

$$ {\text{S}}_{\text{Curve}} \left( {\upvarepsilon,{\text{d}}} \right) = \left| {{\text{CCF}}\left( {\upvarepsilon - \frac{\text{d}}{2}} \right)} \right|^{2} - \left| {{\text{CCF}}\left( {\upvarepsilon + \frac{\text{d}}{2}} \right)} \right|^{2} $$
(7)

The locking point deviation ε_bias (d) is satisfied:

$$ {\text{S}}_{\text{Curve}} \left( {\upvarepsilon_{\text{bias}} \left( {\text{d}} \right),{\text{d}}} \right) = 0 $$
(8)

As shown in the Fig. 8, it is the ranging error generated by the measured signal. As shown in the Fig. 9 which is the ranging error of the simulate signal calculated by the analog threat parameter adopted in this paper.

Fig. 8
figure 8

Measured signal ranging error

Fig. 9
figure 9

Simulationsignal ranging error

6 Conclusion

In this paper, the model of BDS signal simulation distortion is discussed in detail, and the parameters of analog threat model are quantitatively deduced. The ideal signal obtained from the calculated σ and \( {\text{f}}_{\text{d}} \) parameters fits well with the measured signal. To a certain extent, this article provides support for the quantitative analysis of the simulated distortion parameters of BDS signals. Based on this, the effect of analog distorted signal on the ranging performance is verified. The results show that: (1) the analog threat calculated by the parameters are better fitted to the measured waveforms; (2) the higher the simulated distortion, the greater the impact on the ranging performance. These are of great importance to the subsequent BDS signal quality assessment.