学位论文详细信息
Requirements for keyless jamming mitigation
Jamming Mitigation
Esteki, Danesh ; Hu ; Yih-Chun
关键词: Jamming Mitigation;   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/29730/Esteki_Danesh.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

One of the primary advantages of spread spectrum communication is its resistance to interference and jamming. However, it has the drawback of requiring the pre-establishment of a secret code between sender and receiver. This requirement can lead to scaling and security issues, especially in a broadcast setting; as a result, several “uncoordinated” approaches have been proposed that do not require a pre-established secret code. In this thesis, we examine the underlying assumptions of these approaches and their resource requirements. In particular, we develop the model of areactive jammer, parameterize it with varying levels of ability, and use this model to analyze three proposed keyless jamming mitigation techniques.We show that many of the uncoordinated spread spectrum schemes are infeasible for realistic computational powers and allocations of bandwidtheven if the attacker simply uses commercial-off-the-shelf equipment. We also show that the third scheme, BBC codes, is vulnerable to a mark-cancellation-and-insertion attack. In particular, we show how an attacker can use multiplesinusoids to “search” for a cancellation signal over the space of phase and channel condition. We also propose modifications to improve the BBC codes, which can provide more robust jamming resistance with plausible systembandwidth requirements.

【 预 览 】
附件列表
Files Size Format View
Requirements for keyless jamming mitigation 277KB PDF download
  文献评价指标  
  下载次数:16次 浏览次数:45次