• Title/Summary/Keyword: Countermeasure signal

Search Result 66, Processing Time 0.032 seconds

Parameter Estimation of Linear-FM with Modified sMLE for Radar Signal Active Cancelation Application

  • Choi, Seungkyu;Lee, Chungyong
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.6
    • /
    • pp.372-381
    • /
    • 2014
  • This study examined a radar signal active cancelation technique, which is a theoretical way of achieving stealth by employing a baseband process that involves sampling the incoming hostile radar signal, analyzing its characteristics, and generating countermeasure signals to cancel out the linear-FM signal of the hostile radar signal reflected from the airborne target. To successfully perform an active cancelation, the effects of errors in the countermeasure signal were first analyzed. To generate the countermeasure signal that requires very fast and accurate processing, the down-sampling technique with the suboptimal maximum likelihood estimation (sMLE) scheme was proposed to improve the speed of the estimation process while preserving the estimation accuracy. The simulation results showed that the proposed down-sampling technique using a 2048 FFT size yields substantial power reduction despite its small FFT size and exhibits similar performance to the sMLE scheme using the 32768 FFT size.

SOCMTD: Selecting Optimal Countermeasure for Moving Target Defense Using Dynamic Game

  • Hu, Hao;Liu, Jing;Tan, Jinglei;Liu, Jiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.10
    • /
    • pp.4157-4175
    • /
    • 2020
  • Moving target defense, as a 'game-changing' security technique for network warfare, realizes proactive defense by increasing network dynamics, uncertainty and redundancy. How to select the best countermeasure from the candidate countermeasures to maximize defense payoff becomes one of the core issues. In order to improve the dynamic analysis for existing decision-making, a novel approach of selecting the optimal countermeasure using game theory is proposed. Based on the signal game theory, a multi-stage adversary model for dynamic defense is established. Afterwards, the payoffs of candidate attack-defense strategies are quantified from the viewpoint of attack surface transfer. Then the perfect Bayesian equilibrium is calculated. The inference of attacker type is presented through signal reception and recognition. Finally the countermeasure for selecting optimal defense strategy is designed on the tradeoff between defense cost and benefit for dynamic network. A case study of attack-defense confrontation in small-scale LAN shows that the proposed approach is correct and efficient.

Jammer Identification Technique based on a Template Matching Method

  • Jin, Mi Hyun;Yeo, Sang-Rae;Choi, Heon Ho;Park, Chansik;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.3 no.2
    • /
    • pp.45-51
    • /
    • 2014
  • GNSS has the disadvantage of being vulnerable to jamming, and thus, the necessity of jamming countermeasure techniques has gradually increased. Jamming countermeasure techniques can be divided into an anti-jamming technique and a jammer localization technique. Depending on the type of a jammer, applicable techniques and performance vary significantly. Using an appropriate jamming countermeasure technique, the effect of jamming on a GNSS receiver can be attenuated, and prompt action is enabled when estimating the location of a jammer. However, if an inappropriate jamming countermeasure technique is used, a GNSS receiver may not operate in the worst case. Therefore, jammer identification is a technique that is essential for proper action. In this study, a technique that identifies a jammer based on template matching was proposed. For template matching, analysis of a received jamming signal is required; and the signal analysis was performed using a spectral correlation function. Based on a simulation, it was shown that the proposed identification of jamming signals was possible at various JNR.

Design of a CT Saturation Detection Technique with the Countermeasure for a Spike Signal

  • Kang, Yong-Cheol;Yun, Jae-Sung
    • KIEE International Transactions on Power Engineering
    • /
    • v.3A no.2
    • /
    • pp.85-92
    • /
    • 2003
  • When a current transformer (CT) is saturated, the wave-shape of the secondary current is distorted and contains points of inflection, which correspond to the start or end of each saturation period. Discontinuity in the first-difference function of the current arises at points of inflection, where the second and third differences convert into pulses that can be used to detect saturation. This paper describes the design and evaluation of a CT saturation detection technique using the third-difference function and includes the countermeasure for a spike signal. Test results clearly demonstrate that the algorithm successfully detects the start and end of each saturation period irrespective of the remanent flux and magnetization inductance in the saturated region. This paper concludes by describing the results of hardware implementation of the algorithm using a DSP.

A Counter-Countermeasure using Signal Distribution Characteristics between Two Bands in a Crossed Array Tracker (십자 배열 탐색기에서의 두 대역간 신호 분포 특성을 이용한 반대응 능력)

  • 이석한;오정수;서동선;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.316-323
    • /
    • 2002
  • In this paper, we propose a counter-countermeasure (CCM) in a crossed array tracker for efficient target tracking under countermeasures (CM) operated by a target. The proposed CCM adepts two detection bands and uses the signal distribution characteristics to discriminate between the target and the CMs. To avoid wrong detection of a target position due to missing signal pulses, it predicts current target position based on previous target position. To evaluate the performance of the proposed CCM in a crossed array tracker, we perform numerical simulations for target signal extraction and target tracking under various conditions. The simulation results show that the proposed CCM removes the CM effect well and tracks the target efficiently.

Dynamic simultiaon of infrared reticle seekers and an efficient counter-countermeasure algorithm (적외선 레티클 탐색기의 동적 시뮬레이션 및 효율적인 반대응 알고리즘)

  • 한성현;홍현기;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3165-3173
    • /
    • 1996
  • The existing modeling of infrared reticle seekers is perfored in a static sitic situation. Inthis paper, we develop the dynamic simulator of the reticle seekers and propose an efficient signal processing algorithm in multiple targets, especially flares. the developed simuator is essential to analyze the performance of the infrared reticle seekers in various conditions and study effective signal procesing techniques. Simulations show that the proposed counter-countermeasure algorithm is simple and efficient.

  • PDF

A Study on Security Threat Elements Analysis and Security Architecture in Satellite Communication Network (위성 통신망 보안 위협요소 분석 및 보안망 구조에 관한 연구)

  • 손태식;최홍민;채송화;서정택;유승화;김동규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.15-31
    • /
    • 2001
  • In this paper we classify security threat elements of satellite communication into four parts; Level-0(satellite propagation signal), Level-1(satellite control data), Level-2(satellite application data) and ground network security level according to the personality and data of the satellite communication network. And we analyze each security levels. Using analyzed security threat elements, we divide security requirements into signal security level and information security level separately. And then above the existent signal security level countermeasure, we establish the countermeasure on the basis of information security policy such as satellite network security policy, satellite system security policy and satellite data security policy in information security level. In this paper we propose secure satellite communication network through the countermeasure based on information security policy.

An Identification Technique of a Target Signal under ECM Environments (ECM 환경하에서 군함에 대한 반사신호를 식별해내는 알고리즘)

  • 서방원;박한춘;김일민;김병조;이재웅;양태석;김형명
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.4 no.2
    • /
    • pp.138-146
    • /
    • 2001
  • The guided missile carries its own tracking radar to detect its target under noisy environments. The enemy warship uses the anti-missile electric-countermeasure(ECM) technique, such as chaff or decoy, so that the approaching guided missile could not destroy it. In this paper we propose the identification algorithm of a target signal when the enemy warship uses the chaff and decoy to deceive the guided missile. In the proposed scheme the mean square errors(MSE) between the received signals and the reference decoy signal, and between the received signals and the reference chaff signal are calculated. Then, the received signal which results in the maximum MSE is regarded as a warship signal. The performance of the proposed algorithm is verified through the computer simulation.

  • PDF

An adaptive clustering scheme for ES (전자전 지원을 위한 적응적 그룹화 기법)

  • Han, Jin-Woo;Song, Kyu-Ha;Lee, Dong-Woen
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.366-368
    • /
    • 2006
  • Electronic warfare Support(ES) system measures pulse characteristics for received RF signals that received from all directions. ES system discriminates the pulse trains that have a rule, correlationship, continuance from collected data and analyze the characteristics of the data, and identify the emitters by comparison with emitter identification data(EID). Because pulse density is very high and various signal source exists at modem signal environments, high-speed and accurate signal analysis is needed for realtime countermeasure to emitters. Grouping alleviates the load of signal analysis process and supports reliable analysis. In this paper, we suggest an adaptive clustering scheme regarding signal patterns.

  • PDF

A Software Power Analysis Countermeasure Using Secrete Intermediate Key (비밀 중간키를 이용한 소프트웨어적 전력분석공격 방어대책)

  • Park, YoungGoo;Kim, HyeongRag;Lee, HoonJae;Han, DeokChan;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2883-2890
    • /
    • 2013
  • Correlation power analysis attack takes place at the point of operating a known value and a hidden value from a master key as an input. The hidden value can be found by analyzing a correlation between the result value and the measured power signal during the operation, witch makes it possible to estimate the master key from the hidden value. However, the correlation power analysis attack can be very difficult by changing the conditions that make the power analysis possible, when the known value and the operation is hidden, when it is impossible to estimate the master key from the hidden value, or when the correlation between the result value and the power signal is considerably lowered. Therefore this study proposes a software countermeasure using a secrete intermediate key to witch these conditions are applied.