• Title/Summary/Keyword: Communication Jamming

Search Result 183, Processing Time 0.024 seconds

Capacity of a DS-CDMA Satellite Communication System under a Multitone Jamming (톤 재밍환경에서 DS-CDMA방식 위성통신 링크의 용량분석)

  • Choi, Young-Kyun
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.6
    • /
    • pp.30-36
    • /
    • 1999
  • Jamming is an important factor in the military satellite communication system. In this paper, link capacity and jamming margin of the DS-CDMA(Direct Sequence-Code Division Multiple Access) military satellite communication system are analyzed and calculated under a multitone jamming. The analysis was performed with two types of transponders loaded on a geosynchronous satellite. Calculation methods for link capacity and jamming margin were obtained. The results of the analysis show that capacity of a transponder which does modulation/demodulation, decoding/encoding in addition to despreading/respeading is twice as much as that of a tranponder which does despreading /respreading only.

  • PDF

Performance Comparison of the OFDM/SFH and OFDM/DS Systems in the Jamming Channel (OFDM/SFH와 OFDM/DS 시스템의 Jamming 채널에서 성능비교)

  • 박종현;김상우;유흥균;이상태
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.14 no.11
    • /
    • pp.1149-1155
    • /
    • 2003
  • OFDM/SFH(orthogonal frequency division multiplexing/slow frequency hopping) system is the combination of OFDM communication system with frequency hopping(FH) method and OFDM/DS(orthogonal frequency division multiplexing/direct sequence) system combines the OFDM communication system with direct sequence(DS) method in terms of PN(pseudo noise) sequence. These two systems are also can be used for anti-jamming. In this study we analyze performances of OFDM/SFH system and OFDM/DS system with the equal information rate in partial band jamming and tone jamming channel. We find BER(bit error rate) in the variation of JFR(jamming fractional ratio) and JSR(jamming to signal power ratio) of the partial band jamming. Also, BER is found in the several JSR of the single tone or multi tone jamming. OFDM/DS system shows better performance than OFDM/SFH system in partial band jamming environment. OFDM/DS system has about 2.5 ㏈ SNR(signal to noise power ratio) gains than OFDM/SFH system when JFR=4/16 and JSR=0 ㏈ to meet BER=10$\^$-3/. However, OFDM/SFH system has about 3 ㏈ SNR gains than OFDM/DS system at single tone jamming of JSR=5 ㏈. In multi tone jamming, performance of OFDM/SFH system is considerably degraded than OFDM/DS system.

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Performance Analysis aginst Single Tone Jamming for CPM DS-SS System with FSK Modulation. (FSK 변조에 의한 CPM DS-SS 통신시스템의 단일주파수 잡음에 대한 성능평가)

  • Park, Chong-Yeon;Hwang, Jun-Won
    • Journal of Industrial Technology
    • /
    • v.17
    • /
    • pp.153-160
    • /
    • 1997
  • This paper has analyzed the performance against a single tone jamming for the CPM DS-SS system with a Binary FSK Modulation. The CPM DS-SS system designed with the different phase shift of the same pseude-noise code has the advantage of reducing the jamming and interference effects on multi-users communication environment. Analytical results show that the system preformance improves by increasing parrallel users in the presence of the coherent single-tone, which is the worst interference since the jamming signal has the same frequency as a carrier.

  • PDF

Coded Performance of FH/BFSK Communication Systems with Partical Band Jamming (부분대역 재밍 신호하에서 부호화된 FH/BFSK 통신 시스팀의 성능)

  • 박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.8
    • /
    • pp.837-845
    • /
    • 1992
  • This paper shows the performance of FH /BFSK communication systems under worst case Jamming interference. The channel Is modeled with ratio-threshold technique, and as a lamming signal the tone Jamming and Gaussian Jamming are used. The performance is analyzed by using the channel capacity which is the code rate and bit signal-to-Jammer ratio, and we show that the performance degration becomes large as background noise Is big and obtain the best performance when the threshold level f is about 1.5.

  • PDF

A hidden anti-jamming method based on deep reinforcement learning

  • Wang, Yifan;Liu, Xin;Wang, Mei;Yu, Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3444-3457
    • /
    • 2021
  • In the field of anti-jamming based on dynamic spectrum, most methods try to improve the ability to avoid jamming and seldom consider whether the jammer would perceive the user's signal. Although these existing methods work in some anti-jamming scenarios, their long-term performance may be depressed when intelligent jammers can learn user's waveform or decision information from user's historical activities. Hence, we proposed a hidden anti-jamming method to address this problem by reducing the jammer's sense probability. In the proposed method, the action correlation between the user and the jammer is used to evaluate the hiding effect of the user's actions. And a deep reinforcement learning framework, including specific action correlation calculation and iteration learning algorithm, is designed to maximize the hiding and communication performance of the user synchronously. The simulation result shows that the algorithm proposed reduces the jammer's sense probability significantly and improves the user's anti-jamming performance slightly compared to the existing algorithms based on jamming avoidance.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Jamming Effect of Phase-Coded Pulse Compression Radar (위상코드 펄스압축 레이더의 재밍 효과)

  • Lim, Joong-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.125-129
    • /
    • 2019
  • This paper describes the jamming effect of phase-coded pulse compression(PCPC) radar. Barker code radar, a typical PCPC radar, separates transmission pulses into 13 or 31 small pulses and phase modulates and transmits each pulse signal to increase radar detection efficiency and reduce the influence of jamming. Generally, when the radar is subjected to jamming, the detection distance becomes shorter and the detection error rate becomes higher. In the case of noise jamming or carrier jamming on the PCPC radar, the jamming effect is very small for no phase-coded convergence. However, the jamming effect is large in the case of synchronous jamming using the pulse-coded signal as a jamming signal with DRFM. It can be seen that the jamming effect increases when the storage time of the pulse-coded signal is prolonged. This study is considered to be useful for PCPC radar and EW jamming system design.

A Solution of Binary Jamming Message to Source-Wiretapping and Disadvantage of Sharing the Jamming Signal in Physical-Layer Security (물리 계층에서 보안 재밍 신호 공유의 한계점과 이진 재밍 메시지 도청의 해결책)

  • Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.63-67
    • /
    • 2014
  • A distributed zero-beamforming based cooperative jamming technique is useless when an eavesdropper detects the sharing seed. In addition, the currently alternatives are very limited when the eavesdropper is located nearby a source for wiretapping. This letter presents a solution to this extreme case. Relay randomly generates and transmits a binary jamming message to both source and destination in the first phase. When these two receivers securely and correctly decode the message, the source creates and transmits another message based on the use of exclusive-or for its information message and the decoded message. Consequently, the next transmission can avoid the eavesdropping.