signal jamming
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 10)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Vol 13 (3) ◽  
pp. 227-244
Author(s):  
Anatoliy R. Ilchuk ◽  
◽  
Vladimir I. Merkulov ◽  
Andrey I. Panas ◽  
Vladimir S. Chernov ◽  
...  

The effectiveness of destruction of air objects (AO) largely depends on the excellence of radar devices, which are called radar homing heads (RHH) of the guided weapons systems (GWS). In the process of GWS AO development, several generations of RHHs were created: semi-active RHHs with a pulsed or continuous target illumination signal; RHHs providing combined guidance; RHHs, providing realization of inertial guidance with radio correction from the weapon control system of the GWS carrier, active guidance, a combination of semi-active and active modes, combined guidance, in which inertial guidance with radio correction, passive and active homing are consistently implemented. Currently, there is a need for an analytical generalization of information about the GHHs, published in various open scientific and technical sources of information. In the course of the analysis, it was found that the main directions for improving the RHHs are: the development of new, more flexible non-stationary homing methods and their information support, which provide the ability to intercept new types of AO in complex signal-jamming multipurpose situations. This predetermines the need to achieve a high level of RHHs protection from natural and intentional interference, the use of trajectory control of observation when aiming at radio-emitting and group objects, improvement of situational awareness, RHHs intellectualization and digitalization, improvement of RHH antenna systems.


Author(s):  
Pierre Uhrich ◽  
Michel Abgrall ◽  
Franziska Riedel ◽  
Baptiste Chupin ◽  
Joseph Achkar ◽  
...  
Keyword(s):  

Author(s):  
H. Luke Anderson ◽  
Ammon Perkes ◽  
Julian S. Gottfried ◽  
Hayden B. Davies ◽  
David J. White ◽  
...  

2020 ◽  
Vol 14 (4) ◽  
pp. 368-379 ◽  
Author(s):  
Max Ingham ◽  
Jims Marchang ◽  
Deepayan Bhowmik

2020 ◽  
Vol 10 (10) ◽  
pp. 3613
Author(s):  
Malek Karaim ◽  
Mohamed Tamazin ◽  
Aboelmagd Noureldin

The Global Positioning System (GPS) provides an accurate navigation solution in the open sky. However, in some environments such as urban areas or in the presence of signal jamming, GPS signals cannot be easily tracked since they could be harshly attenuated or entirely blocked. This often requires the GPS receiver to go into a signal re-acquisition phase for the corresponding satellite. To avoid the intensive computations necessary for the signal re-lock in a GPS receiver, a robust signal-tracking mechanism that can hold and/or rapidly re-lock on the signals and keep track of their dynamics becomes a necessity. This paper augments a vector-based GPS signal tracking system with a Reduced Inertial Sensor System (RISS) to produce a new ultra-tight GPS/INS integrated system that enhances receivers’ tracking robustness and sensitivity in challenging navigation environments. The introduced system is simple, efficient, reliable, yet inexpensive. To challenge the proposed method with real jamming conditions, real experiment work was conducted inside the Anechoic Chamber room at the Royal Military College of Canada (RMC). The Spirent GSS6700 signal simulator was used to generate GPS signals, and an INS Simulator is used for simulating the inertial measurement unit (IMU) to generate the corresponding trajectory raw data. The NEAT jammer, by NovAtel, was used to generate real jamming signals. Results show a good performance of the proposed method under real signal jamming conditions.


2020 ◽  
pp. 685-695
Author(s):  
Danda B. Rawat ◽  
Brycent A. Chatfield

The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.


2019 ◽  
Vol 8 (4) ◽  
pp. 9372-9376

In the war prone global arena where every target of an enemy, on and off the land to be kept on eagle’s eye watch and to deceive enemy’s counter measure technologies, there is a strong requirement for most secured signal design which domicile maximum detection range along with high range resolution, to flare them up .The efficiency of the system mainly depends on how much power the generated pulse may possess in the main lobe to that of the side lobes and how independent they are from one another. The measure of Autocorrelation and cross correlation exhibited by polyphase coded sequence is determined mathematically. Multi input and multi output possesses best potential in mitigating the effects of fading, enhancing the resolution, suppressing the signal jamming and interference, which are all very useful in improving the target detection and recognition performance of the system. Recently, most optimization researches of polyphase codes are carried out by genetic algorithm (GA), Particle swarm optimization (PSO) and simulated annealing (SA) but this technique require more parameters for optimization. In order to overcome these difficulties modified PSO algorithm is adopted in the present research to optimize the polyphase coded sequence. The obtained codes are also put for Doppler resilience by including Doppler shift in the process of generation of the codes.


2019 ◽  
Vol 69 (2) ◽  
pp. 55-67
Author(s):  
KAZUMA HASE ◽  
SHIZUKO HIRYU
Keyword(s):  

Wired networks add to cost and space required to setup while wireless networks are easy to expand without adding complexity of cables. Most organizations implement wireless networks as an extension to an existing wired connection by installing multiple access points at various locations to cover larger area. The wi-fi network users can be assigned limited and restricted access to the actual wired network and organizational resources. Although less reliable, wireless networks offer mobility, flexibility, ease of deployment, scalability with reduced cost of implementation. However, besides these many advantages, wireless network expands the security threat level by offering ease of intercepting network traffic to the hackers via open networks. Hence, there is a need to determine the potential wi-fi security threats, attacks, attacking tools, and possible countermeasures to be used to secure organizational wireless networks. This chapter focuses on different IEEE 802.11 wireless standards, authentication and association processes in 802.11, and WLAN frame structure. This chapter explains different wireless attacks like war-driving, war-chalking, wi-fi signal jamming, denial of service (DOS) attack, rogue access point attack, wireless traffic analysis, MAC spoofing, de-authentication attack, man-in-the-middle attack, evil twin attack, cracking wi-fi encryptions, spectrum analysis, bluetooth devices attacks, etc. The chapter also discusses different tools used for carrying out wireless attacks or auditing wireless security like NetStumbler, Kismet, Aircrack, insider, KisMAC, WEPWedgie, WIDZ, and Snort-wireless. The chapter also discusses countermeasures against these attacks.


Sign in / Sign up

Export Citation Format

Share Document