• 제목/요약/키워드: Wireless Jamming

검색결과 59건 처리시간 0.022초

A Survey of Security Mechanisms with Direct Sequence Spread Spectrum Signals

  • Kang, Taeho;Li, Xiang;Yu, Chansu;Kim, Jong
    • Journal of Computing Science and Engineering
    • /
    • 제7권3호
    • /
    • pp.187-197
    • /
    • 2013
  • Security has long been a challenging problem in wireless networks, mainly due to its broadcast nature of communication. This opens up simple yet effective measures to thwart useful communications between legitimate radios. Spread spectrum technologies, such as direct sequence spread spectrum (DSSS), have been developed as effective countermeasures against, for example, jamming attacks. This paper surveys previous research on securing a DSSS channel even further, using physical layer attributes-keyless DSSS mechanisms, and watermarked DSSS (WDSSS) schemes. The former has been motivated by the fact that it is still an open question to establish and share the secret spread sequence between the transmitter and the receiver without being noticed by adversaries. The basic idea of the latter is to exploit the redundancy inherent in DSSS's spreading process to embed watermark information. It can be considered a counter measure (authentication) for an intelligent attacker who obtains the spread sequence to generate fake messages. This paper also presents and evaluates an adaptive DSSS scheme that takes both jam resistance and communication efficiency into account.

IEEE 802.15.4 환경 하에서의 IEEE 802.11b의 성능 해석 (Performance Analysis of IEEE 802.11b under IEEE 802.15.4 Environment)

  • 윤대길;신수용;권욱현;김정준;김용호;신영희
    • 정보통신설비학회논문지
    • /
    • 제4권2호
    • /
    • pp.9-17
    • /
    • 2005
  • Coexistence of different wireless systems that share the 2.4 GHz ISM frequency band is becoming one of the most important issue. This paper presents a model of the interference that IEEE 802.11b affected by IEEE 802.15.4. The packet error rate (PER) of IEEE 802.11b under the interference of IEEE 802.15.4 is analyzed. The PER is obtained by using the bit error rate (BER) and the collision time. Further, this paper suggests a packet length to reduce the effect of the IEEE 802.15.4 interference and obtain a maximum throughput of the IEEE 802.11b. The analytical results are validated using simulation.

  • PDF

근거리의 자외선 비가시거리 통신에 관한 연구 (Study on Short-range Non-line-of-sight Ultraviolet Communication)

  • 박동국
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제36권1호
    • /
    • pp.179-184
    • /
    • 2012
  • 기존의 무선 RF 통신은 근거리에서 전력손실이 상대적으로 크고, 전파간섭 및 방해, 재밍 등에 민감하다. 이러한 단점을 보완하는 대안으로 자외선을 이용한 통신 방식에 대한 연구가 최근 관심을 받고 있다. 본 논문에서 자외선을 이용한 비가시거리 통신의 data rate 특성에 대해 시뮬레이션한 결과를 제시하였다. On-off keying 방식을 사용하는 비가시거리 자외선 통신에서 data rate는 송신 빔의 방향, 수신빔의 빔 폭, 송신 전력에 의해 큰 영향을 받는다는 것을 확인하였다.

안테나 이득을 고려한 EIRP 측정 방법에 관한 연구 (The study on the EIRP measurement methods considering Antenna Gain)

  • 김동호;최동근;신찬수;신호섭;김남
    • 한국전자파학회:학술대회논문집
    • /
    • 한국전자파학회 2003년도 종합학술발표회 논문집 Vol.13 No.1
    • /
    • pp.555-559
    • /
    • 2003
  • Recently, in accordance with the commercialization of novel radio frequency utilization technologies, the radiated power must be rigorously limited for the purpose of protection of wireless facilities against frequency jamming or interference and for maintaining the quality of communication service. At present, the output power is measured from the conducted power for the domestic measurement criterion but is not a real radiated power and inaccurate. So, it is peformed to survey the more precisely accurate measurement scheme and analyze its criterion and methodology in comparison with foreign one. As a result of surveying and analyzing, it is concluded that the U.S. and E.U. is actually using the measurement method in consideration of terms of the Equivalent Isotropic Radiated Power(EIRP) and Effective Radiated power(ERP). In case of the frequency below 1 GHz, the half wave-length dipole antenna is used to measure the ERP and above 1 GHz the horn antenna as a reference antenna is used to measure the EIRP. Therefore, for the domestic purpose it is also necessary to take EIRP and ERP into consideration as a measurement criterion in order to make an accurate measurement and regulation.

  • PDF

전자공격체계 연구개발 동향 분석과 발전방안에 대한 연구 (A Study on the Analysis of R&D Trends and the Development Plan of Electronic Attack System)

  • 심재성;박병호
    • 한국산학기술학회논문지
    • /
    • 제22권6호
    • /
    • pp.469-476
    • /
    • 2021
  • 전자공격체계는 전파를 사용하는 방공 레이더, 무선 지휘통신망, 유도 미사일과 같은 다중 위협에 대해 신호추적, 전자교란 등의 전자전 임무 수행을 위한 필수 무기체계이다. 군사적으로는 전자공격 임무 수행을 통해 다중 위협의 기능무력화 등 해당 위협으로부터 아군 전력을 보호하여 생존성 향상과 더불어 전투효과 극대화가 가능하다. 또한, 최근 민간분야에서는 공항, 통신 기지국, 발전소와 같은 핵심기반시설에 대한 드론 공격 등의 위협 대응을 위하여 전파방해 시스템으로 활용이 가능하다. 본 연구에서는 항공 플랫폼 기반 국외 전자공격체계에 대하여 전자공격 임무에 따른 분류 기준을 살펴본 후 이에 따른 국외 전자공격체계의 최신 연구개발 동향을 조사·분석한다. 더불어, 운용환경별 국내 전자공격체계의 연구개발 동향과 국내 안보환경 속에서 예측되는 미래 전장환경을 분석하여 국외 연구개발 동향 대비 국내 전자공격체계의 기술분야별 연구 발전이 필요한 다중위협 대응 신호추적 기술, 고출력 동시 전자교란 기술 등 다변적이고 고도화 되는 미래 전장환경에 부합할 수 있는 국내 전자공격체계의 연구 발전방안을 제시한다.

무인항공기의 안전한 도입을 위한 보안기능요구사항 개발 (Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle)

  • 강동우;원동호;이영숙
    • 융합보안논문지
    • /
    • 제19권4호
    • /
    • pp.97-105
    • /
    • 2019
  • 니콜라 테슬라에 의해 항공기의 무선제어 가능성이 제시되면서 출현한 무인항공기는 제 1, 2차 세계대전을 통해 항공력의 급속한 발전과 함께 군사, 방산용으로 사용하게 되었다. 2000년대, 무인항공기의 분야가 촬영, 배송, 통신 등 민간분야까지 확대됨에 따라 여러 서비스와 융합되어 활용되고 있다. 하지만, 최근 무인항공기 시스템에서의 통신이나 무인항공기 자체의 보안 취약점을 이용하여 GPS 스푸핑, 전파 교란 공격 등을 시도하는 보안사고가 발생하고 있다. 이에, 안전한 무인항공기의 도입을 위하여 국내에서는 자체 무인항공기 검증 제도인 감항 인증 제도가 마련되었다. 그러나 감항 인증 제도는 무인항공기의 보안성보다는 시험 비행, 설계 및 물리적 구조의 안전성과 인증하는 쪽에 초점이 맞추어져 있다. 보안성 높은 안전한 무인항공기의 도입을 위해 본 논문에서는 무인항공기 시스템 모델을 제안하고 데이터 흐름도를 작성하였다. 작성한 데이터 흐름도를 바탕으로 무인항공기 시스템에서의 위협을 도출하였고, 도출한 위협을 방지할 수 있는 보안기능요구사항을 개발하였다. 제안한 보안기능요구사항을 통해 향후 무인항공기의 안전한 도입을 위한 앞으로의 평가, 검증 기술의 발전 방향을 제시한다.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권4호
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Phase Jitter Analysis of Overlapped Signals for All-to-All TWSTFT Operation

  • Juhyun Lee;Ju-Ik Oh;Joon Hyo Rhee;Gyeong Won Choi;Young Kyu Lee;Jong Koo Lee;Sung-hoon Yang
    • Journal of Positioning, Navigation, and Timing
    • /
    • 제12권3호
    • /
    • pp.245-255
    • /
    • 2023
  • Time comparison techniques are necessary for generating and keeping Coordinated Universal Time (UTC) and distributing standard time clocks. Global Navigation Satellite System (GNSS) Common View, GNSS All-in-View, Two-Way Satellite Time and Frequency Transfer (TWSTFT), Very Long Baseline Interferometry (VLBI), optical fiber, and Network Time Protocol (NTP) based methods have been used for time comparison. In these methods, GNSS based time comparison techniques are widely used for time synchronization in critical national infrastructures and in common areas of application such as finance, military, and wireless communication. However, GNSS-based time comparison techniques are vulnerable to jamming or interference environments and it is difficult to respond to GNSS signal disconnection according to the international situation. In response, in this paper, Code-Division Multiple Access (CDMA) based All-to-All TWSTFT operation method is proposed. A software-based simulation platform also was designed for performance analysis in multi-TWSTFT signal environments. Furthermore, code and carrier measurement jitters were calculated in multi-signal environments using the designed simulation platform. By using the technique proposed in this paper, it is anticipated that the TWSTFT-based time comparison method will be used in various fields and satisfy high-performance requirements such as those of a GNSS master station and power plant network reference station.