共查询到18条相似文献,搜索用时 156 毫秒
1.
地域通信网的干扰技术研究 总被引:1,自引:0,他引:1
本文在分析地域通信网结构及组成的基础上,研究了对地域通信网实施的节点破坏、末端信息封锁、局部阻塞瘫痪等对抗方法,并使用干扰地域通信网的程度、节点干扰率、末端节点封锁率和传递信息误差率等指标对干扰效果进行评估。 相似文献
2.
3.
4.
链路是通信网络的重要组成部分。在干扰条件下,从理论上建立链路模型,并根据链路的分类和信道的误码率对链路阻塞率进行了研究。在此基础上,文章给出了某地域通信网一个四节点网络干扰时的链路选择示例,并进行了仿真。 相似文献
5.
一种野战地域通信网网络节点和链路重要性的评估方法 总被引:1,自引:0,他引:1
评估网络节点和链路的重要性,是研究野战地域通信网网络可靠性的重要内容。在采用节点收缩法判断网络节点重要性的基础上,结合实例,提出了利用层次分析法确定连接于核心节点的各条链路权重值的方法,进而得出野战地域通信网网络节点和链路重要性的评估方法,为野战地域通信网的可靠性研究和电子对抗作战提供参考。 相似文献
6.
7.
地域通信网是现代军事通信中一种重要手段,链路是通信网络的重要组成部分。不同通信体制下对链路干扰的效果是不同的,误码率是衡量通信质量的重要参数,干信比是对干扰效能的衡量指标,而链路阻塞率则是对网络服务质量进行描述的具体参数,研究不同通信体制下3种变量之间的关系对地域通信网干扰研究具有十分重要的意义。文章正是在地域通信网单链路的基础上,从链路模型和通信干扰效果两个方面出发,研究了链路阻塞率、干信比和误码率之间的关系,并进行了计算机仿真。 相似文献
8.
通过对典型地域通信网组成的分析,提出了对其实施电子对抗的方法和手段,包括对节点中心、入口节点的对抗和信息封锁。同时,就地域通信网的电子对抗作战效能评估构建了一套“自底向上”的评估指标,并依据有关指标进行了相应的作战效能评估。通过模拟试验,对比分析了传统干扰力量和未来干扰力量的干扰效果,得出了一些建设性的结论。 相似文献
9.
地域通信网中各节点之间的正常通信是保障作战胜利的关键,由于地域通信网中各节点间的连接多采用无线链路,可以使用流量攻击的方法对链路进行攻击,使各节点通信中断。在分析流量控制和拥塞控制的基础上,结合OPNET仿真软件建立网络模型,通过仿真研究验证了流量攻击法可以有效地使地域通信网通信中断,达到攻击的目的。 相似文献
10.
分析了地域通信网的网络模型,从网络的拓扑结构出发,以图论知识为基础,把节点的度数和聚合度作为衡量节点重要性的标准,给出了关键节点的定义方法,通过分析对比得出地域通信网中有些关键节点并不具有较大的度分布特征,而且链路之间存在着一定的差别,采用度作为节点重要性的评估方法具有一定的片面性。在此基础上,文中提出了一种基于聚合度大小排序的关键节点识别方法,并给出了关键节点识别流程。实例分析结果表明了该方法的有效性、简单性和准确性。 相似文献
11.
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt
the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few
works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire
the common cryptographic information of the sensor network and then jams the network through those compromised nodes. In this
paper, we address the insider jamming problem in wireless sensor networks. In our proposed solutions, the physical communication
channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the
network will generate a new group key to be shared only by the non-compromised nodes. After that, the insider jammers are
revoked and will not be able to predict the future communication channels used by the non-compromised nodes. Specifically,
we propose two compromise-resilient anti-jamming schemes: the split-pairing scheme which deals with a single insider jammer, and the key-tree-based scheme which copes with multiple colluding insider jammers. We implement and evaluate the proposed solutions using Mica2
Motes. Experimental results show that our solutions have low recovery latency and low communication overhead, and hence they
are suitable for resource constrained sensor networks. 相似文献
12.
吕久明 《电子信息对抗技术》2003,18(4):46-48,34
在野战地域通信网中 ,无线链路占有较大的比例。而这些系统中的节点都需要保持相互的通信联络。为此 ,从通信链路攻击野战地域通信网系统的可行性比较大。本文主要介绍了流量控制、流量攻击 ,并提出了流量攻击的一些方法 相似文献
13.
14.
K. P. Vijayakumar P. Ganeshkumar M. Anandaraj K. Selvaraj P. Sivakumar 《International Journal of Communication Systems》2018,31(10)
In this paper, a fuzzy logic–based jamming detection algorithm (FLJDA) is proposed to detect the presence of jamming in downstream data communication for cluster‐based wireless sensor networks. The proposed FLJDA keeps an eye on the existing nodes and new node to determine their behavior by applying fuzzy logic on measured jamming detection metrics. To monitor the behavior of the nodes, the FLJDA computes the jamming detection metrics, namely, packet delivery ratio and received signal strength indicator. The major features of this paper are the following: (1) The jamming detection algorithm is specifically implemented for downstream data communication, (2) cluster head estimates jamming detection metrics for detecting the jamming unlike the existing algorithms where individual nodes explicitly collect the jamming detection metrics, and (3) the proposed algorithm optimizes the jamming detection metrics on the basis of fuzzy logic unlike the existing approaches, which uses merely jamming detection threshold alone for jamming detection. The simulation results of the proposed system provide the true detection ratio as high as 99.89%. 相似文献
15.
Vandana Milind Rohokale Neeli Rashmi Prasad Ramjee Prasad 《Wireless Personal Communications》2013,73(3):595-610
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This research work proposes a novel cooperative jamming mechanism for scalable networks like wireless sensor networks which makes use of friendly interference to confuse the eavesdropper and increase its uncertainty about the source message. The communication link is built with the help of Information theoretic source and channel coding mechanisms. The whole idea is to make use of normally inactive relay nodes in the selective Decode and Forward cooperative communication and let them work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity. 相似文献
16.
随着电子对抗技术的飞速发展,通信对抗装备愈来愈广泛地用于电子对抗领域。结合通信对抗装备技术特征,本文重点研究采用 DSSS(直接序列扩频)调制技术的通信装备在以噪声干扰为主要方式对抗条件下,误码率与干信比、信噪比之间的关系,得到了在同等条件下, 部分频带干扰效果优于宽带干扰效果的结论,该结论对进一步深入研究干扰技术和干扰效果具有参考价值。 相似文献
17.
通信干扰效果的好坏是评定通信干扰装备基本指标,目前在半实物仿真试验领域还没有一套有效评估通信干扰效果的方法,只能利用模拟仿真进行评估。通过研究通信信号的调制识别理论,提出了基于调制识别理论及小波理论的对二进制相移键控信号干扰效果的评估方法,仿真实验证明了此方法的有效性。 相似文献
18.
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications.
Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this
information can provide important insights for networks to manage its resource in different layers and to defend against radio
interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular,
we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize
network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes,
we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative
localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing
the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation
to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective
in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches. 相似文献