首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 156 毫秒
1.
地域通信网的干扰技术研究   总被引:1,自引:0,他引:1  
本文在分析地域通信网结构及组成的基础上,研究了对地域通信网实施的节点破坏、末端信息封锁、局部阻塞瘫痪等对抗方法,并使用干扰地域通信网的程度、节点干扰率、末端节点封锁率和传递信息误差率等指标对干扰效果进行评估。  相似文献   

2.
本文在分析地域通信网结构及组成的基础上,研究了对地域通信网实施的节点破坏、末端信息封锁、局部阻塞瘫痪等对抗方法,并使用干扰地域通信网的程度、节点干扰率、末端节点封锁率和传递信息误差率等指标对干扰效果进行评估。  相似文献   

3.
针对无线通信情况下地域通信网中心交换机节点间的通信质量,采用模块化的方法描述节点对象的行为并对节点进行建模,通过OPNET网络仿真工具对地域通信网各网络节点的仿真模型以及组成各节点的进程模块进行设计实现,结合地域通信网的一个实例,得出了节点受不同干扰情况下的全局数据业务丢包率和话音业务呼损率。  相似文献   

4.
施伟  张玉 《电子技术》2009,46(1):39-41
链路是通信网络的重要组成部分。在干扰条件下,从理论上建立链路模型,并根据链路的分类和信道的误码率对链路阻塞率进行了研究。在此基础上,文章给出了某地域通信网一个四节点网络干扰时的链路选择示例,并进行了仿真。  相似文献   

5.
一种野战地域通信网网络节点和链路重要性的评估方法   总被引:1,自引:0,他引:1  
评估网络节点和链路的重要性,是研究野战地域通信网网络可靠性的重要内容。在采用节点收缩法判断网络节点重要性的基础上,结合实例,提出了利用层次分析法确定连接于核心节点的各条链路权重值的方法,进而得出野战地域通信网网络节点和链路重要性的评估方法,为野战地域通信网的可靠性研究和电子对抗作战提供参考。  相似文献   

6.
随着现代通信技术的发展,通信干扰的对象已由单一信号源转向通信网。为了有效评估对无线通信网的干扰效能,在构建通信网干扰模型的基础上,提出了一种基于传统误码率理论的无线通信网干扰效能评估方法,并进行了干扰效能评估仿真。仿真结果验证了该方法的科学性和可行性,表明了对干扰组资源采用适度倾向性分配方式能够提高对通信网的干扰效能,在实际对抗中对通信网实施有效干扰具有重要的指导意义。  相似文献   

7.
施伟  张玉 《电子测试》2009,(2):15-17,21
地域通信网是现代军事通信中一种重要手段,链路是通信网络的重要组成部分。不同通信体制下对链路干扰的效果是不同的,误码率是衡量通信质量的重要参数,干信比是对干扰效能的衡量指标,而链路阻塞率则是对网络服务质量进行描述的具体参数,研究不同通信体制下3种变量之间的关系对地域通信网干扰研究具有十分重要的意义。文章正是在地域通信网单链路的基础上,从链路模型和通信干扰效果两个方面出发,研究了链路阻塞率、干信比和误码率之间的关系,并进行了计算机仿真。  相似文献   

8.
通过对典型地域通信网组成的分析,提出了对其实施电子对抗的方法和手段,包括对节点中心、入口节点的对抗和信息封锁。同时,就地域通信网的电子对抗作战效能评估构建了一套“自底向上”的评估指标,并依据有关指标进行了相应的作战效能评估。通过模拟试验,对比分析了传统干扰力量和未来干扰力量的干扰效果,得出了一些建设性的结论。  相似文献   

9.
地域通信网中各节点之间的正常通信是保障作战胜利的关键,由于地域通信网中各节点间的连接多采用无线链路,可以使用流量攻击的方法对链路进行攻击,使各节点通信中断。在分析流量控制和拥塞控制的基础上,结合OPNET仿真软件建立网络模型,通过仿真研究验证了流量攻击法可以有效地使地域通信网通信中断,达到攻击的目的。  相似文献   

10.
分析了地域通信网的网络模型,从网络的拓扑结构出发,以图论知识为基础,把节点的度数和聚合度作为衡量节点重要性的标准,给出了关键节点的定义方法,通过分析对比得出地域通信网中有些关键节点并不具有较大的度分布特征,而且链路之间存在着一定的差别,采用度作为节点重要性的评估方法具有一定的片面性。在此基础上,文中提出了一种基于聚合度大小排序的关键节点识别方法,并给出了关键节点识别流程。实例分析结果表明了该方法的有效性、简单性和准确性。  相似文献   

11.
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised nodes. In this paper, we address the insider jamming problem in wireless sensor networks. In our proposed solutions, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by the non-compromised nodes. After that, the insider jammers are revoked and will not be able to predict the future communication channels used by the non-compromised nodes. Specifically, we propose two compromise-resilient anti-jamming schemes: the split-pairing scheme which deals with a single insider jammer, and the key-tree-based scheme which copes with multiple colluding insider jammers. We implement and evaluate the proposed solutions using Mica2 Motes. Experimental results show that our solutions have low recovery latency and low communication overhead, and hence they are suitable for resource constrained sensor networks.  相似文献   

12.
在野战地域通信网中 ,无线链路占有较大的比例。而这些系统中的节点都需要保持相互的通信联络。为此 ,从通信链路攻击野战地域通信网系统的可行性比较大。本文主要介绍了流量控制、流量攻击 ,并提出了流量攻击的一些方法  相似文献   

13.
分析野战地域通信网中地面对抗设备存在的局限性,探讨利用升空平台实现对抗的可行性,并提出计算机病毒对抗方法和利用地域网工作可靠性来评估地域网干扰效果。分析表明,对地域网进行干扰应根据作战要求综合采取各种手段,以削弱敌通信保障能力。  相似文献   

14.
In this paper, a fuzzy logic–based jamming detection algorithm (FLJDA) is proposed to detect the presence of jamming in downstream data communication for cluster‐based wireless sensor networks. The proposed FLJDA keeps an eye on the existing nodes and new node to determine their behavior by applying fuzzy logic on measured jamming detection metrics. To monitor the behavior of the nodes, the FLJDA computes the jamming detection metrics, namely, packet delivery ratio and received signal strength indicator. The major features of this paper are the following: (1) The jamming detection algorithm is specifically implemented for downstream data communication, (2) cluster head estimates jamming detection metrics for detecting the jamming unlike the existing algorithms where individual nodes explicitly collect the jamming detection metrics, and (3) the proposed algorithm optimizes the jamming detection metrics on the basis of fuzzy logic unlike the existing approaches, which uses merely jamming detection threshold alone for jamming detection. The simulation results of the proposed system provide the true detection ratio as high as 99.89%.  相似文献   

15.
Interference is generally considered as the redundant and unwanted occurrence in wireless communication. This research work proposes a novel cooperative jamming mechanism for scalable networks like wireless sensor networks which makes use of friendly interference to confuse the eavesdropper and increase its uncertainty about the source message. The communication link is built with the help of Information theoretic source and channel coding mechanisms. The whole idea is to make use of normally inactive relay nodes in the selective Decode and Forward cooperative communication and let them work as cooperative jamming sources to increase the equivocation of the eavesdropper. In this work, eavesdropper’s equivocation is compared with the main channel in terms of mutual information and secrecy capacity.  相似文献   

16.
侯文博 《现代导航》2017,8(5):377-380
随着电子对抗技术的飞速发展,通信对抗装备愈来愈广泛地用于电子对抗领域。结合通信对抗装备技术特征,本文重点研究采用 DSSS(直接序列扩频)调制技术的通信装备在以噪声干扰为主要方式对抗条件下,误码率与干信比、信噪比之间的关系,得到了在同等条件下, 部分频带干扰效果优于宽带干扰效果的结论,该结论对进一步深入研究干扰技术和干扰效果具有参考价值。  相似文献   

17.
通信干扰效果的好坏是评定通信干扰装备基本指标,目前在半实物仿真试验领域还没有一套有效评估通信干扰效果的方法,只能利用模拟仿真进行评估。通过研究通信信号的调制识别理论,提出了基于调制识别理论及小波理论的对二进制相移键控信号干扰效果的评估方法,仿真实验证明了此方法的有效性。  相似文献   

18.
Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号