• Title/Summary/Keyword: Signal Jamming

Search Result 261, Processing Time 0.029 seconds

Tactical Beamforming for Anti-Jamming Under Limited Feedback (제한된 피드백 상황에서의 항재밍을 위한 전략적 빔형성)

  • Lim, Sung-Ho;Han, Sungmin;Lee, Jaeseok;Choi, Ji-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1410-1413
    • /
    • 2016
  • Array beamforming for anti-jamming means that jamming signals are superposed destructively, while superposing information signals constructively at a receiver. However, according to channel state variation, the anti-jamming performance of the beamforming can be degraded because of large beamwidth of the sidelobe and lower selectivity of the mainlobe. To mitigate this problem, we introduce a beamformed decoy signal which uses frequency band distinguished from the information signal to make the jammer concentrate its jamming power to a wrong target under limited feedback. In this paper, we show that the performance of the proposed scheme can approach that of optimal one with perfect feedback.

A Novel Jamming Detection Technique for Wireless Sensor Networks

  • Vijayakumar, K.P.;Ganeshkumar, P.;Anandaraj, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4223-4249
    • /
    • 2015
  • A novel jamming detection technique to detect the presence of jamming in the downstream direction for cluster based wireless sensor networks is proposed in this paper. The proposed technique is deployed in base station and in cluster heads. The proposed technique is novel in two aspects: Firstly, whenever a cluster head receives a packet it verifies whether the source node is legitimate node or new node. Secondly if a source node is declared as new node in the first step, then this technique observes the behavior of the new node to find whether the new node is legitimate node or jammed node. In order to monitor the behavior of the existing node and new node, the second step uses two metrics namely packet delivery ratio (PDR) and received signal strength indicator (RSSI). The rationality of using PDR and RSSI is presented by performing statistical test. PDR and RSSI of every member in the cluster is measured and assessed by the cluster head. And finally the cluster head determines whether the members of the cluster are jammed or not. The CH can detect the presence of jamming in the cluster at member level. The base station can detect the presence of jamming in the wireless sensor network at CH level. The simulation result shows that the proposed technique performs extremely well and achieves jamming detection rate as high as 99.85%.

Performance Analysis aginst Single Tone Jamming for CPM DS-SS System with FSK Modulation. (FSK 변조에 의한 CPM DS-SS 통신시스템의 단일주파수 잡음에 대한 성능평가)

  • Park, Chong-Yeon;Hwang, Jun-Won
    • Journal of Industrial Technology
    • /
    • v.17
    • /
    • pp.153-160
    • /
    • 1997
  • This paper has analyzed the performance against a single tone jamming for the CPM DS-SS system with a Binary FSK Modulation. The CPM DS-SS system designed with the different phase shift of the same pseude-noise code has the advantage of reducing the jamming and interference effects on multi-users communication environment. Analytical results show that the system preformance improves by increasing parrallel users in the presence of the coherent single-tone, which is the worst interference since the jamming signal has the same frequency as a carrier.

  • PDF

Performance Comparison of OFDM and FMT Systems under Jamming Environment (재밍 환경 하에서 OFDM과 FMT 시스템의 성능 비교)

  • Kim, Jong-Mann
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.100-106
    • /
    • 2007
  • In this paper, the performance of OFDM(Orthogonal Frequency Division Multiplexing) and FMT(Filtered Multi-tone) Systems is compared under jamming environment. Two systems are multi-carrier systems to improve data rates. Through the comparison of two systems under jamming environment, the characteristics and strong/weak points of each system are analyzed.

Modeling Jamming Avoidance Response of Pulse-type Weakly Electric Fish (전기물고기의 방해 회피 반응 모델링과 응용)

  • Soh, JaeHyun;Kim, DaeEun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.10
    • /
    • pp.924-929
    • /
    • 2015
  • In this paper, we suggest a phase difference algorithm inspired by weakly electric fish. Weakly electric fish is a fish which generates electric field though its electric organ in the tail. The weakly electric fish search for prey and detect an object by using electrolocation. The weakly electric fish have Jamming Avoidance Response (JAR) to avoid jamming signal. One of pulse-type weakly electric fish Gymnotus carapo also have JAR to reduce the probability of coincidence of pulses. We analyze this response signal and design the phase difference algorithm. We expect that simple algorithm inspired by weakly electric fish can be used in many engineering fields.

Coded Performance of FH/BFSK Communication Systems with Partical Band Jamming (부분대역 재밍 신호하에서 부호화된 FH/BFSK 통신 시스팀의 성능)

  • 박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.8
    • /
    • pp.837-845
    • /
    • 1992
  • This paper shows the performance of FH /BFSK communication systems under worst case Jamming interference. The channel Is modeled with ratio-threshold technique, and as a lamming signal the tone Jamming and Gaussian Jamming are used. The performance is analyzed by using the channel capacity which is the code rate and bit signal-to-Jammer ratio, and we show that the performance degration becomes large as background noise Is big and obtain the best performance when the threshold level f is about 1.5.

  • PDF

Joint optimization of beamforming and power allocation for DAJ-based untrusted relay networks

  • Yao, Rugui;Lu, Yanan;Mekkawy, Tamer;Xu, Fei;Zuo, Xiaoya
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.714-725
    • /
    • 2018
  • Destination-assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ-based untrusted relay network with multiple antennas installed is presented. To increase the secrecy, a joint optimization of beamforming and power allocation at the source and destination is studied. A matched-filter precoder is introduced to maximize the cooperative jamming signal by directing cooperative jamming signals toward untrusted relays. Then, based on generalized singular-value decomposition (GSVD), a novel transmitted precoder for confidential signals is devised to align the signal into the subspace corresponding to the confidential transmission channel. To decouple the precoder design and optimal power allocation, an iterative algorithm is proposed to jointly optimize the above parameters. Numerical results validate the effectiveness of the proposed scheme. Compared with other schemes, the proposed scheme shows significant improvement in terms of security performance.

A Combined Pseudo-random Noise Signal Based Advanced Region Correlation Scheme for BOC(pn,n) Modulated GNSS Signals in Repeat-back Jamming Environment (재방송 재밍 환경에서 BOC(pn,n) GNSS 변조된 신호를 위한 CP-ARC 기법)

  • Yoo, Seungsoo;Yeom, Dong-Jin;Jee, Gyu-In;Kim, Sun Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.11
    • /
    • pp.977-983
    • /
    • 2016
  • This paper proposes a novel code-tracking scheme to track the fine code synchronization for BOC (pn,n)-modulated global navigation satellite system signals in a repeat-back jamming environment. The correlation function of BOC (pn,n)-modulated signals has several peaks. The correlation function in the advanced offset region remains almost unchanged due to the repeat-back signals being received later than a line-of-sight signal in the same multipath signal receiving case. Additionally, the combined pseudo-random noise signal can be treated as repeat-back jamming signals, like multipath signals. In this paper, we propose a novel code-tracking scheme utilizing the advantages of using a combined pseudo-random noise signal in the advanced offset region and verify its performance through simulation.

Evaluation of Vulnerability to Jamming Signal of WiBro System (와이브로 시스템의 방해 신호 취약성 분석)

  • Baek, Seung-Min;Park, Su-Won;Choi, Yong-Hoon;Chung, Young-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.529-537
    • /
    • 2010
  • Because the location of the pilot sub-carriers of WiBro system ca be acquired from the specification, jamming signals can easily attack them. It causes more serious error than the attack to the data sub-carriers. Therefore, for military application of the WiBro system, frequency hopping or encryption of location of pilot sub-carriers is needed.