مقاله انگلیسی رایگان در مورد کاهش تداخل واکنشی در جنگ الکترونیکی – IEEE 2019

 

مشخصات مقاله
ترجمه عنوان مقاله Bittransfer: کاهش تداخل واکنشی در سناریوهای جنگ الکترونیکی
عنوان انگلیسی مقاله Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
انتشار مقاله سال 2019
تعداد صفحات مقاله انگلیسی 16 صفحه
هزینه دانلود مقاله انگلیسی رایگان میباشد.
پایگاه داده نشریه IEEE
نوع نگارش مقاله
مقاله پژوهشی (Research Article)
مقاله بیس این مقاله بیس نمیباشد
نمایه (index) Scopus – Master Journals List – JCR
نوع مقاله ISI
فرمت مقاله انگلیسی  PDF
ایمپکت فاکتور(IF)
4.641 در سال 2018
شاخص H_index 56 در سال 2019
شاخص SJR 0.609 در سال 2018
شناسه ISSN 2169-3536
شاخص Quartile (چارک) Q2 در سال 2018
مدل مفهومی ندارد
پرسشنامه ندارد
متغیر ندارد
رفرنس دارد
رشته های مرتبط مهندسی برق، مهندسی فناوری اطلاعات و ارتباطات
گرایش های مرتبط برق مخابرات، دیتا و امنیت شبکه
نوع ارائه مقاله
ژورنال
مجله / کنفرانس دسترسی – IEEE Access
دانشگاه  Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar
کلمات کلیدی تداخل، جنگ الکترونیکی، امنیت سیستم ارتباطی، ارتباط بی سیم، پروتکل های ضد تداخلی، امنیت سیستم های سایبری – فیزیکی
کلمات کلیدی انگلیسی  Jamming, electronic warfare, communication system security, wireless communication, anti-jamming protocols, cyber-physical systems security
شناسه دیجیتال – doi
https://doi.org/10.1109/ACCESS.2019.2949716
کد محصول  E13915
وضعیت ترجمه مقاله  ترجمه آماده این مقاله موجود نمیباشد. میتوانید از طریق دکمه پایین سفارش دهید.
دانلود رایگان مقاله دانلود رایگان مقاله انگلیسی
سفارش ترجمه این مقاله سفارش ترجمه این مقاله

 

فهرست مطالب مقاله:
Abstract
I. Introduction
II. Related Work
III. Scenario and Adversary Models
IV. The Bittransfer Protocol at Glance
V. Performance Assessment
Authors
Figures
References

 

بخشی از متن مقاله:
Abstract

Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols—the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.

Introduction

Electronic Warfare (EW) scenarios involve a variety of powerful attacks against wired and wireless networks, where attackers use any meaningful tool to disrupt the operation of the communication infrastructure of the competing entities in the target area [1]. The increasing advancements in manufacturing and embedding technologies experienced in the last decade have boosted the effectiveness of EW systems and strategies, especially in the military application domain [2]. EW systems inspect thoroughly the electromagnetic environment in the target area, analyze the communication technologies used by the competing party, and design ad-hoc stealthy methods to shut them down and reduce organization and response capabilities of the contenders [3], [4]. In this context, jamming is still the most powerful and convenient Denial of Service (DoS) attack that can be performed to disrupt wireless communications [5]. By simply deploying a single device emitting noise at high power on the same channel used for ongoing wireless communications, any radio operation is disrupted, independently from the selected communication technology [6]. In addition, the commercial diffusion of low-cost and low-effort Software Defined Radios (SDRs) has further lowered the technological barrier necessary to launch jamming attacks [7]. Between the large number of jamming attacks that can be achieved, Reactive Jamming is the most effective and difficult to detect [8].

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا