• Title/Summary/Keyword: 기만대응

Search Result 31, Processing Time 0.024 seconds

Anti-Spoofing Method Using Double Peak Detection in the Two-Dimensional C/A Code Search Space (이차원 C/A 코드 검색 공간에서의 이중피크 검출을 이용한 기만신호 대응 기법)

  • Kwon, Keum-Cheol;Yang, Cheol-Kwan;Shim, Duk-Sun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.157-164
    • /
    • 2013
  • In the presence of spoofing signal the GPS signal having the same PRN with the spoofer is hard to be acquired since the power of spoofing signal is usually stronger than that of GPS signal. If a spoofing signal exists for the same PRN, there are double peaks in two-dimensional space of frequency and code phase in acquisition stage. Using double peak information it is possible to detect spoofing signal and acquire GPS information through separate channel tracking. In this paper we introduce an anti-spoofing method using double peak detection, and thus can acquire GPS navigation data after two-channel tracking for the same PRN as the spoofing signal.

Performance Comparison of Anti-Spoofing Methods using Pseudorange Measurements (의사거리 측정치를 이용하는 기만신호 검출 기법의 성능 비교)

  • Cho, Sung-Lyong;Shin, Mi-Young;Lee, Sang-Jeong;Park, Chan-Sik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.793-800
    • /
    • 2010
  • GPS spoofing is an intentional interference which uses the mimic GPS signals to fake the receivers. The generic GPS receiver is hard to recognize the spoofing signal because the spoofer generates the fake signals as close as possible to the GPS signal. So the spoofer can do critical damage to public operations. This paper introduces a basic concept of spoofing and analyzes the effect of the spoofing signal to the GPS receiver. Also for stand-alone GPS receivers, two anti-spoofing methods are implemented : RAIM based method and the SQM based method. To evaluate the performance of anti-spoofing method, the software based spoofing signal generator and GPS signal generator are implemented. The performance of the anti-spoofing methods obtained using the output of the software based GPS receiver shows that SQM based method is more effective when multiple spoofing signals exist.

GNSS Techniques for Enhancing Flight Safety of UAS (무인항공기 안전성 강화를 위한 위성항법시스템 적용 방안)

  • Park, Je-hong
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.1
    • /
    • pp.58-65
    • /
    • 2017
  • Global navigation satellite system (GNSS) has a weakness of signal integrity caused by broadcasting type data transmitting direct to user from navigation satellite. Loss of GNSS signal integrity can make a catastrophic event in the operation of unmanned aerial system (UAS) because position decision is only depended on GNSS. So it is required to apply alternative method to reduce a risk and to guarantee a GNSS signal integrity for UAS operation. This paper addressed the reason of loosing GNSS signal integrity, the effectiveness of signal jamming/spoofing and GNSS application trend for UAS. Also suggested the flight safety enhancing method in case of GNSS signal jamming for UAS as technical and political approaches.

Analysis of the Engagement Effects of DIRCM against a Man Portable Air Defense System (휴대용대공유도탄에 대응하는 지향성적외선방해장비의 교전효과 분석)

  • Jeong, Chunsik
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.139-147
    • /
    • 2019
  • A MANPADS(Man Portable Air Defense System), which tracks infrared energy, is light enough for individuals to carry and can against to a variety of aircraft, making it widely deployed around the world, posing a major threat to aircraft. A flare has been developed as an IRCM(Infrared Countermeasures) that protects the life of friendly aircraft and combatants by deceiving such guided missiles. However, DIRCM, which can overcome the problems of existing IRCM, is being developed mainly in some developed countries, and the need for it has been increasing gradually. This paper modeled first generation IR seeker of AM modulation method, the second generation IR seeker of FM modulation method, and the third generation IR seeker of pulse modulation method among various MANPADS, and modeled the scattering light phenomenon in the seeker when laser beams are investigated in DIRCM. Using this, jamming simulations were performed in various engagement environments of the MANPADS and aircraft equipped with DIRCM, and the miss distance of the guided missiles and aircraft were analyzed. Simulation results show that DIRCM, which irradiates a modulated laser beam with one jamming code, deceives both first, second and third generation MANPADS at 1km and 2km of engagement distance. In particular, the survival rate of aircraft equipped with DIRCM increased when the distance of engagement increased from 1km to 2km, and the survival rate was at least 99% at 2km of engagement distance.

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

Analysis of Actual Condition of Counterfeits and Anti-Counterfeiting Strategies of Korean Fashion Firms (국내 패션기업의 위조상품 관리실태 및 대응전략분석)

  • 김용주
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.1
    • /
    • pp.53-67
    • /
    • 2004
  • The purpose of this study was to analyze anti-counterfeiting strategies of fashion firms in Korea. Data was collected by in-depth interviews for 25 fashion firms and 5 buying offices who had been victims of counterfeiting. The result showed that fashion firms recognized the counterfeiting, especially deceptive counterfeiting, as a serious problem in Korea and seek for stronger protection. Fashion firms adopted diverse strategies for the protection of trademark and for the protection of design; (1) Investigation and Surveillance, (2) Warning, (3) Prosecution, (4) Lawsuit, (5) Consumer education (6) High-tech tabooing, (7) Provide incentives, (8) Penalty, (9) Do nothing. Despite the diverse efforts, they proposed the most desirable strategies to deter the counterfeiting as the changes of consumer attitude and stronger legal protection.

Radar Countermeasure and Effect Analysis for the Pull-Off Deceptive Jamming Signal (Pull-Off 기만 재밍 신호에 대한 레이다 대응기법 및 효과 분석)

  • Jang, Sunghoon;Kim, Seonjoo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.221-228
    • /
    • 2020
  • This paper presents the radar counter jamming algorithm and ground far-field test results for the pull-off deceptive jamming signals like RGPO(Range Gate Pull Off) and VGPO(Velocity Gate Pull Off). We designed the radar counter jamming algorithm according to the characteristics of the deceptive jamming signals. This algorithm is validated by simulation before ground far-field test. The existing X-band AESA radar demonstrator was used to test the proposed algorithm. The proposed algorithm was applied to the radar processor software. The deceptive jamming signals generated using the commercial jamming signal generator. We performed the repeated ground far-field test with the test scenario. Test results show that the proposed counter deceptive jamming algorithm works in the real radar system.

ECCM Design of Tracking Radar (추적 레이다의 대전자전 설계)

  • Hong-Rak Kim;Man-Hee Lee;Sung-Ho Park;Youn-Jin Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.51-57
    • /
    • 2024
  • The tracking radar system is a pulsed tracking system that searches, detects, and tracks targets in real time for ships operating in the ocean. Ships defend themselves through soft kill operations to confuse or deceive the tracking radar. Soft Kill operations include passive chaff and active noise jamming. This paper understands the basic concepts of electronic warfare and explains various deception systems in operation on ships. In addition, each deception The radar system design to respond to the system is explained.

Transmission Performance of MANET under Grayhole Attack (Grayhole 공격이 있는 MANET의 전송성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.639-642
    • /
    • 2015
  • As attack to routing function on MANET(Mobile Ad-Hoc Network), hole attack make cause some critical effects. MANET is easily influenced with hole attack and can be critically effected on transmission performance, because it is configured with terminal device as temporary network and dose not have effective means for malicious attack. In this paper, effects of grayhole attack to network performance on MANTE is analyzed with computer simulation. Voice traffic is used in simulation, effects of grayhole attack is compaerd with blackhole attack. The method and result of this paper can be used for data to study grayhoke attack.

  • PDF

A Study on the Jamming Simulator Design for the Test & Evaluation of Broadband Radar's Electronic Protection Techniques (광대역 레이더의 전자보호기법 시험평가를 위한 재밍시뮬레이터 설계 연구)

  • Lee, Sung-Ho;Jung, Hoi-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.611-621
    • /
    • 2010
  • When an enemy platforms transmit electronic jamming or tracking interference signal to a friendly ship's radar, the radar have to avoid the jamming and to track targets continually without losing the targets with the electronic protection techniques. Electronic protection is an essential key for a platform to survive in electronic warfare, for this purpose, jamming simulator was developed to provide electronic warfare environments for the test and evaluate the effectiveness of radar's electronic protection techniques. Jamming simulator has ability to generate a variety of deception and noise jamming signals using the DRFM which minimize phase distortions of 1GHz broadband radar signal with the phase sampling method. This paper presents the design contents of the jamming simulator to process the analysis of broadband radar signal and generate jamming signal, also proposes the algorithms of the deception and noise jamming and verifies the effectiveness of the simulator by field trial.