• Title/Summary/Keyword: Communication Jamming

Search Result 183, Processing Time 0.033 seconds

A Variable Hysteresis Comparator Circuit Controlled by Serial Digital Bits Against Jamming (교란 방어를 위하여 히스테리시스가 시리얼로 제어되는 가변 비교기 회로)

  • Kim, Young-Gi
    • Journal of IKEEE
    • /
    • v.16 no.1
    • /
    • pp.20-27
    • /
    • 2012
  • In order to overcome jamming, a hysteresis tunable monolithic comparator circuit based on a 0.35 ${\mu}m$ CMOS process is suggested, designed, fabricated, measured and analyzed in this paper. To tune the threshold voltage of the hysteresis in the comparator circuit, two external digital bits are used with supply voltage of 3.3V. An improved variable hysteresis comparator circuit controlled by serial digital bits is suggested, designed and simulated to overcome jamming in modern warfare.

Performance Analysis of FH/CPFSK System in the Partial-band Jamming Noise (부분대역 재밍하에서 FH/CPFSK 시스템의 성능 분석)

  • 정근열;박진수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.4
    • /
    • pp.499-504
    • /
    • 2002
  • In this paper, we analyzed the performance of FH/CPFSK system with differential detection in thermal noise, partial-band jamming noise and adjacent interference of all eight bit pattern. The parameters to analize performances of FH/CPFSK system have been used the bit rate, modulation index and performances of FH/CPFSK system with the differential detector have been presented with the optimum correlation function. And, we were compared with performance of FH/CPFSK and FH/BFSK system. In result, we could know that bit error probability of the approximation equation and exact equation nearly accorded in the high signal-to-noise ratio. And, we have been proved that FH/CPFSK system with differential detection according to jamming fraction ${\gamma}$ was worst to 3dB than FH/CPFSK system with limiter-discriminator. but was superior to 2dB than FH/BFSK.

Joint Beamforming and Power Splitting Design for Physical Layer Security in Cognitive SWIPT Decode-and-Forward Relay Networks

  • Xu, Xiaorong;Hu, Andi;Yao, Yingbiao;Feng, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.1-19
    • /
    • 2020
  • In an underlay cognitive simultaneous wireless information and power transfer (SWIPT) network, communication from secondary user (SU) to secondary destination (SD) is accomplished with decode-and-forward (DF) relays. Multiple energy-constrained relays are assumed to harvest energy from SU via power splitting (PS) protocol and complete SU secure information transmission with beamforming. Hence, physical layer security (PLS) is investigated in cognitive SWIPT network. In order to interfere with eavesdropper and improve relay's energy efficiency, a destination-assisted jamming scheme is proposed. Namely, SD transmits artificial noise (AN) to interfere with eavesdropping, while jamming signal can also provide harvested energy to relays. Beamforming vector and power splitting ratio are jointly optimized with the objective of SU secrecy capacity maximization. We solve this non-convex optimization problem via a general two-stage procedure. Firstly, we obtain the optimal beamforming vector through semi-definite relaxation (SDR) method with a fixed power splitting ratio. Secondly, the best power splitting ratio can be obtained by one-dimensional search. We provide simulation results to verify the proposed solution. Simulation results show that the scheme achieves the maximum SD secrecy rate with appropriate selection of power splitting ratio, and the proposed scheme guarantees security in cognitive SWIPT networks.

Numerical Integration-based Performance Analysis of Cross-eye Jamming Algorithm through Amplitude Ratio Perturbation (진폭비 섭동에 의한 cross-eye 재밍에 대한 수치적분 기반 성능분석)

  • Kim, Je-An;Choi, Yoon-Ju;Lee, Joon-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.59-64
    • /
    • 2021
  • This paper deals with the performance analysis of the jamming effect of cross-eye when the difference between the real amplitude ratio and the nominal amplitude ratio due to mechanical defects is modeled as a random variable with a normal distribution. We propose how to evaluate mean square difference (MSD) obtained using a numerical integration-based approach. The MSD obtained by the proposed method is closer to non-approximated Monte-Carlo simulation-based MSD than the analytic MSD calculated using the first-order Taylor approximation and the second-order Taylor approximation. It is shown that, based on the numerical integration, the effect of amplitude ratio perturbation on the cross-eye jamming performance can be evaluated without going through the computationally intensive Monte-Carlo method.

Mathematical Algorithms for Two-Dimensional Positioning Based on GPS Pseudorange Technique

  • Ko, Kwang-Soob;Choi, Chang-Mook
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.602-607
    • /
    • 2010
  • Recently, one has realized that the threedimensional positioning technique used in GPS can be effectively applied to the modern two-dimensional positioning. Such a technique might has applied to the twodimensional positioning in fields of the mobile communication, eLORAN and the GPS jamming/ electronic warfare system. In the paper, we have studied on algorithms for two-dimensional positioning based on GPS Pseudorange Technique. The main works and results are summarized below. First, the linearized state equation was mathematically derived based on GPS pseudorange technique. Second, the geometry model with respect to triangles formed using unit-vectors were proposed for investigation of land-based radio positioning. Finally, the corresponding mathematical formulations for DOP values and covariance matrix were designed for two-dimensional positioning.

Malicious Attack Success Probability on the Change of Vulnerable Surfaces in MTD-SDR System (MTD-SDR 시스템의 취약요소 변경에 따른 악의적 공격 성공 확률)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.55-62
    • /
    • 2018
  • The MTD-based approach changes various operating parameters dynamically so that the vulnerability of the system can be protected from the malicious attack. In this paper, random/serial scanning/jamming attack success probabilities have been mathematically analyzed and verified through simulation to improve the security of the wireless communication systems in which the MTD-SDR technologies are applied. As a result, for random scanning attacks, attack success probability increases as the change period of transmission channel increases, while for random jamming attacks there is no change. The attack success probability patterns for serial attacks are similar to those of random attacks, but when the change period of transmission channel approaches to the total number of transmission channels, the success probability of serial attack is getting greater than that of random attack, up to twice in jamming attacks and up to 36% in scanning attacks.

Improved Anti-Jamming Frame Error Rate and Hamming Code Repetitive Transmission Techniques for Enhanced SATURN Network Reliability Supporting UAV Operations (UAV 운영 신뢰성 개선을 위한 SATURN 통신망 항재밍 프레임 오율과 해밍코드 반복 전송 향상 기술)

  • Hwang, Yoonha;Baik, Jungsuk;Gu, Gyoan;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2022
  • As the performance of Unmanned Aerial Vehicles (UAVs) are improving and the prices are lowering, it is expected that the use of UAVs will continuously grow in the future. It is important to always maintain control signal and video communication to operate remote UAVs stably, especially in military UAV operations, as unexpected jamming attacks can result in fatal UAV crashes. In this paper, to improve the network reliability and low latency when supporting UAV operations, the anti-jamming performance of Second generation Anti-jam Tactical UHF Radio for NATO (SATURN) networks is analyzed and enhanced by applying Forward Error Correction (FEC) and Minimum Shift Keying (MSK) modulation as well as Hamming code based multiple transmission techniques.

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

Present and Future Technologies of Satellite Communication Network Security (위성 통신망 보안 기술 당면 과제 및 향후 발전 방향 분석)

  • Choi, Jihwan;Joo, Changhee
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.3
    • /
    • pp.50-53
    • /
    • 2017
  • Satellite communications are vulnerable to malicious eavesdroppers and interceptors due to wide coverage and broadcasting applications. However, technologies for securing satellite networks have yet to be more articulated beyond high-layer packet encryption. As attempts for jamming and spoofing attacks spread out, it is extremely critical to invest on the development of physical layer security solutions. In this paper, we review current technologies for satellite communication network security both in high and physical layers. We also present recent research results on physical layer security in the fields of information theory and wireless networks. We suggest a future direction for satellite communication security, including a cross-layer approach.