• Title/Summary/Keyword: Wireless Jamming

Search Result 59, Processing Time 0.029 seconds

Performance Analysis of a CSS System in the Presence of Jamming Signals (방해전파 신호에 따른 CSS 시스템의 성능 분석)

  • Lee, Young-Po;Chong, Da-Hae;Song, Chong-Han;Song, Iick-Ho;Yoon, Seok-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.453-459
    • /
    • 2009
  • Due to its capability to resist jamming signals, chirp spread spectrum (CSS) technique has attracted much attention in the field of wireless communications. However, there has been little rigorous analysis for the performance of CSS systems in the presence of jamming signals. In this paper, thus, we present analytic results on the performance of a CSS system: specifically, symbol error rate (SER) expressions are derived for a CSS M-ary phase shift keying (MPSK) system in the presence of broadband and tone jamming signals, respectively. The numerical results show that the empirical SER closely agree with the analytic result.

A study on the development of high-speed wireless modem using DS/SS DQPSK modulation (직접확산 DQPSK 변조방식을 이용한 고속 무선모뎀의 개발에 관한 연구)

  • 오정훈;김진욱;김기두;장수영
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.11
    • /
    • pp.19-31
    • /
    • 1996
  • Spread spectrum method gurantees good performance in digital communication system under multi-path interference and jamming signals. The purpose of this paper is to develop the wireless modem using DS/SS techinque. The transceiver consists of a spread spectrum DQPSK transmitter and a mtching receiver. The system operates with the chipping rate set to 4 Mcps and the number of chips/symbol at 64, making the data rate 62.5 Kbps using QPSK modilation. The receiver section uses a digital matched filter for fast acquisition of burst signals and uses the comparing the BER of proposed system iwth that of narrow bnd system under various additive white gaussian noises. It is showen that the proposed sysem has better performance than narrow band system. When jamming signals is added to the suggested DS/SS system, we also show that the experimental performance (BER) of the suggested wireless modem is almost same as theroretical performance.

  • PDF

Joint optimization of beamforming and power allocation for DAJ-based untrusted relay networks

  • Yao, Rugui;Lu, Yanan;Mekkawy, Tamer;Xu, Fei;Zuo, Xiaoya
    • ETRI Journal
    • /
    • v.40 no.6
    • /
    • pp.714-725
    • /
    • 2018
  • Destination-assisted jamming (DAJ) is usually used to protect confidential information against untrusted relays and eavesdroppers in wireless networks. In this paper, a DAJ-based untrusted relay network with multiple antennas installed is presented. To increase the secrecy, a joint optimization of beamforming and power allocation at the source and destination is studied. A matched-filter precoder is introduced to maximize the cooperative jamming signal by directing cooperative jamming signals toward untrusted relays. Then, based on generalized singular-value decomposition (GSVD), a novel transmitted precoder for confidential signals is devised to align the signal into the subspace corresponding to the confidential transmission channel. To decouple the precoder design and optimal power allocation, an iterative algorithm is proposed to jointly optimize the above parameters. Numerical results validate the effectiveness of the proposed scheme. Compared with other schemes, the proposed scheme shows significant improvement in terms of security performance.

Orthogonal Waveform Space Projection Method for Adaptive Jammer Suppression

  • Lee, Kang-In;Yoon, Hojun;Kim, Jongmann;Chung, Young-Seek
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.868-874
    • /
    • 2018
  • In this paper, we propose a new jammer suppression algorithm that uses orthogonal waveform space projection (OWSP) processing for a multiple input multiple output (MIMO) radar system exposed to a jamming signal. Generally, a conventional suppression algorithm based on adaptive beamforming (ABF) needs a covariance matrix composed of the jammer and noise only. By exploiting the orthogonality of the transmitting waveforms of MIMO, we can construct a transmitting waveform space (TWS). Then, using the OWSP processing, we can build a space orthogonal to the TWS that contains no SOI. By excluding the SOI from the received signal, even in the case that contains the SOI and jamming signal, the proposed algorithm makes it possible to evaluate the covariance matrix for ABF. We applied the proposed OWSP processing to suppressing the jamming signal in bistatic MIMO radar. We verified the performance of the proposed algorithm by comparing the SINR loss to that of the ideal covariance matrix composed of the jammer and noise only. We also derived the computational complexity of the proposed algorithm and compared the estimation of the DOD and DOA using the SOI with those using the generalized likelihood ratio test (GLRT) algorithm.

Physical Layer Security of AF Relay Systems With Jamming.

  • Ofori-Amanfo, Kwadwo Boateng;Lee, Kyoung-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.288-289
    • /
    • 2019
  • This paper studies the secrecy capacity for a wireless cooperative network with perfect channel state information at the relays, and receiver. A similar assumption is also made for the instance where there exist a direct link between the transmitter and receiver. Physical Layer security techniques are employed in wireless networks to mitigate against the activity of eavesdroppers. It offers a viable alternative to computationally intensive encryption. In this paper the design of a protocol utilizing jamming (via jamming nodes) for better security and relaying (via relay nodes) for the amplify-and-forward (AF) operation, is investigated. A a signal-to-noise variant of secrecy known as secrecy gap is explored because of its use of lesser computational power - preferable for practical systems. Thus we maximize this signal-to-noise approach instead of the conventional secrecy capacity maximization method. With this, an iterative algorithm using geometric programming (GP) and semi-definite programming (SDP) is presented with appreciable benefits. The results show here highlight the benefits of using fractional components of the powers of the relays to offer better secrecy capacity.

  • PDF

Frequency Jamming System using Helical Antenna (헬리컬 안테나를 이용한 주파수 재밍 시스템)

  • Park, Ju-Won;Park, Min-U;Ryu, Je-Hyeon;Jang, Sung-Jun;Park, Yong-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.911-916
    • /
    • 2018
  • Among the various microwaves, the microwaves that we are using in our life are the things that combined with the information on what we need with various technologies. However, the signals that we do not want to get as an information is just noise. Therefore, we need to collect only the necessary information, and other information needs to be blocked. This technology is called Jamming. In this paper, the Partial-Band Jamming System through the Helical Antenna about target 95.1 and 97.3MHz in 88Mhz to 108MHz of the FM radio frequency band was studied.

Channel-Hopping Scheme for Enhancing Fairness Performance under Smart Jammer Attacks in Tactical WLANs (전술 무선랜 재밍 환경에서의 형평성 성능 향상을 위한 채널도약 기법)

  • Kim, Yongchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2188-2195
    • /
    • 2015
  • In tactical wireless local area networks, jamming attack can easily occur by sending out continuous radio signals. The damage will be serious when the channel frequency is identical. Since wireless channel environment is open to everyone, the perfect solution for jamming attack does not exist. However, a channel-hopping scheme is well known for mitigating those jamming attacks. In this paper, I consider various channel-hopping schemes in order to analyze the throughput and fairness performance under smart jammer attack. Also an analytical model is introduced to evaluate the throughput performances of channel-hopping schemes. After analyzing well known channel-hopping schemes, I propose a simple channel-hopping scheme that can enhance fairness significantly at minimal throughput degradation expense.

Measurement-based Channel Hopping Scheme against Jamming Attacks in IEEE 802.11 Wireless Networks (IEEE 802.11 무선랜 재밍 환경에서의 측정 기반 채널 도약 기법)

  • Jeong, Seung-Myeong;Jeung, Jae-Min;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4A
    • /
    • pp.205-213
    • /
    • 2012
  • In this paper, we propose a new channel hopping scheme based on IEEE 802.11h as a good countermeasure against jamming attacks in IEEE 802.11 wireless networks. 802.11h Dynamic Frequency Selection (DFS) is a mechanism which enables hopping to a best channel with full channel measurement, not a randomly chosen channel, when the current link quality degradation occurs due to interferers such as military radars. However, under jammer attacks, this needs a time for full channel measurement before a new channel hopping and due to link disconnection during the time network performance degradation is inevitable. In contrast, our proposed schemes make an immediate response right after a jammer detection since every device is aware of next hopping channel in advance. To do this, a next hopping channel is announced by Beacon frames and the channel is selected by full channel measurement within Beacon intervals. Simulation results show that proposed scheme minimizes throughput degradation and keeps the advantages of DFS.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Implementation of reliable transmission technique in jamming environment (방해전파 환경에서 신뢰성을 확보한 효과적 전송기법 구현)

  • Hwang, Seong-kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.12
    • /
    • pp.2279-2284
    • /
    • 2017
  • Recent wireless communications using the unlicensed band have been on the rise and the range of use is increasing. The license-exempted band is a prerequisite for accepting interference between telecommunication equipment. In particular, the interference phenomenon of Bluetooth, wireless LAN, and RFID (Radio Frequency Identification) using the 2.4 GHz band is getting serious. In such urban areas, the wireless transmission medium may be in a bad state. There are roughly two ways to make effective transmission in this environment. The first is the IEEE 802.11 RTS / CTS method and the second is the frame fragmentation method. In this paper, it is difficult to transmit a frame over a certain size in a jamming environment due to the interference of the wireless environment. In this environment, we implement a frame division transmission scheme that guarantees effective transmission and reliability by dividing a frame into smaller units in order to perform reliability transmission and efficient transmission.