• Title/Summary/Keyword: Wireless Jamming

Search Result 59, Processing Time 0.017 seconds

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

  • Kang, Taeho;Li, Xiang;Yu, Chansu;Kim, Jong
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.187-197
    • /
    • 2013
  • Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mechanisms, and watermarked DSSS (WDSSS) schemes. The former has been motivated by the fact that it is still an open question to establish and share the secret spread sequence between the transmitter and the receiver without being noticed by adversaries. The basic idea of the latter is to exploit the redundancy inherent in DSSS's spreading process to embed watermark information. It can be considered a counter measure (authentication) for an intelligent attacker who obtains the spread sequence to generate fake messages. This paper also presents and evaluates an adaptive DSSS scheme that takes both jam resistance and communication efficiency into account.

Performance Analysis of IEEE 802.11b under IEEE 802.15.4 Environment (IEEE 802.15.4 환경 하에서의 IEEE 802.11b의 성능 해석)

  • Yoon, Dae-Kil;Shin, Soo-Young;Kwon, Wook-Hyun;Kim, Jung-Jun;Kim, Young-Ho;Shin, Young-Hee
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.4 no.2
    • /
    • pp.9-17
    • /
    • 2005
  • Coexistence of different wireless systems that share the 2.4 GHz ISM frequency band is becoming one of the most important issue. This paper presents a model of the interference that IEEE 802.11b affected by IEEE 802.15.4. The packet error rate (PER) of IEEE 802.11b under the interference of IEEE 802.15.4 is analyzed. The PER is obtained by using the bit error rate (BER) and the collision time. Further, this paper suggests a packet length to reduce the effect of the IEEE 802.15.4 interference and obtain a maximum throughput of the IEEE 802.11b. The analytical results are validated using simulation.

  • PDF

Study on Short-range Non-line-of-sight Ultraviolet Communication (근거리의 자외선 비가시거리 통신에 관한 연구)

  • Park, Dong-Kook
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.36 no.1
    • /
    • pp.179-184
    • /
    • 2012
  • A conventional wireless rf communication has relatively high ratio of power dissipation to transmit power for short-range links, susceptibility to interference, interception and jamming of electromagnetic wave. The study on alternative using ultraviolet signal to remedy the shortcomings of conventional rf communication has recently received attention. In this paper, the simulation results about the data rate performance of ultraviolet non-line-of-sight communication are provided. It is found that the direction of transmitting beam, receiving field of view width and the transmitting signal power have a seriously effect on the data rate of on-off-keying non-line-of-sight ultraviolet communication.

The study on the EIRP measurement methods considering Antenna Gain (안테나 이득을 고려한 EIRP 측정 방법에 관한 연구)

  • Kim, Dong-Ho;Choi, Dong-Geun;Shin, Chan-Soo;Sin, Ho-Seop;Kim, Nam
    • Proceedings of the Korea Electromagnetic Engineering Society Conference
    • /
    • 2003.11a
    • /
    • pp.555-559
    • /
    • 2003
  • Recently, in accordance with the commercialization of novel radio frequency utilization technologies, the radiated power must be rigorously limited for the purpose of protection of wireless facilities against frequency jamming or interference and for maintaining the quality of communication service. At present, the output power is measured from the conducted power for the domestic measurement criterion but is not a real radiated power and inaccurate. So, it is peformed to survey the more precisely accurate measurement scheme and analyze its criterion and methodology in comparison with foreign one. As a result of surveying and analyzing, it is concluded that the U.S. and E.U. is actually using the measurement method in consideration of terms of the Equivalent Isotropic Radiated Power(EIRP) and Effective Radiated power(ERP). In case of the frequency below 1 GHz, the half wave-length dipole antenna is used to measure the ERP and above 1 GHz the horn antenna as a reference antenna is used to measure the EIRP. Therefore, for the domestic purpose it is also necessary to take EIRP and ERP into consideration as a measurement criterion in order to make an accurate measurement and regulation.

  • PDF

A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System (전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구)

  • Sim, Jaeseong;Park, Byoung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.469-476
    • /
    • 2021
  • An electronic attack (EA) system is an essential weapon system for performing electronic warfare missions that contain signal tracking and jamming against multiple threats using electromagnetic waves, such as air defense radars, wireless command and communication networks, and guided missiles. The combat effectiveness can be maximized, and the survivability of militarily protecting combat power can be enhanced through EA mission operations, such as disabling the functions of multiple threats. The EA system can be used as a radio frequency jamming system to respond to drone attacks on the core infrastructure, such as airports, power plants, and communication broadcasting systems, in the civilian field. This study examined the criteria for classification according to the electronic attack missions of foreign EA systems based on an aviation platform. The foreign R&D trends by those criteria were investigated. Moreover, by analyzing the R&D trends of domestic EA systems and future battlefields in the domestic security environments, this paper proposes technological development plans of EA systems suitable for the future battlefield environments compared to the foreign R&D trends.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.3
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.