期刊文献+

基于软件可定义无线电的通信干扰新分类方法 被引量:1

Communication Jamming Taxonomy based on Software-Defined Radio
下载PDF
导出
摘要 随着软件可定义无线电技术在无线通信中的广泛应用,传统电子战中的干扰与网络攻击之间的区别变得模糊。为了更好地区分通信干扰与网络攻击,分析了一种基于软件可定义无线电的通信干扰分类方法。与以往通过信号物理参数对干扰进行分类不同的是,该方法主要通过干扰方所拥有的先验信息和干扰方反应的能力来进行分类。最后,讨论已有的干扰技术在所提出的分类方法中的所属类别。 With the wide application of software defined-radio technology in wireless networks, the distinction of between jamming in traditional electronic warfare and wireless cybersecurity attack become fairly hazy. In order to differentiate communication jammer from cybersecurity attack, a jammer taxonomy for classification of communication jammers is proposed. In contrast to the traditional jammer categorization via physical parameter of the signal, the proposed method implements classification via the a priori information possessed by and reaction capacity of the jammer. Finally, the jamming techniques in literatures and their classification in the proposed classification system are discussed in this paper.
作者 秦伟 王可人 QIN Wei WANG Ke-ren(Electronic Engineering Institute, Hefei Anhui 230037, Chin)
机构地区 电子工程学院
出处 《通信技术》 2016年第10期1292-1295,共4页 Communications Technology
基金 国家自然科学基金(No.61171170)~~
关键词 干扰 分类方法 无线通信 抗干扰 电子战 jamming taxonomy wireless communication anti-jamming electronic war
  • 相关文献

参考文献17

  • 1Cache J,Liu V.Hacking Exposed Wireless:Wireless Security Secrets & Solutions[M].New York:McGraw-Hill Osborne Media,2007.
  • 2Adamy D L.EW 101[M].London:Artech House,2000.
  • 3Poisel R.Modern Communications Jamming:Principles and Techniques[M].London:Artech House,2011.
  • 4Xu W,Trappe W,Zhang Y,et al.The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks[C]. Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing,2005:46-57.
  • 5Pelechrinis K,Iliofotou M,Krishnamurthy S V.Denial of Service Attacks in Wireless Networks:The Case of Jammers[J].Communications Surveys & Tutorials,2011, 13(02):245-257.
  • 6Barnum S.Common Attack Pattern Enumeration and Classification (Capec) Schema Description[M].Dulles:Cigital Ine,2008.
  • 7Thuente D,Acharya M.Intelligent Jamming in Wireless Networks with Applications to 802,11 b and other networks[C].Proc, of MILCOM,2006.
  • 8Lichtman M,Reed J H,Clancy T C,et al.Vulnerability of LTE to Hostile Interference[C].Global Conference on Signal and Information Processing (GlobalSIP),2013:285-288.
  • 9Amuru S D,Buehrer R M.Optimal Jamming Strategies in Digital Communications-Impact of Modulation[C].Global Communications Conference (GLOBECOM),2014:1619-1624.
  • 10Huang X,Zhang L.An SVM Ensemble Approach Combining Spectral,Structural,and Semantic Features for the Classification of High-resolution Remotely Sensed Imagery[J].Geoscience and Remote Sensing,2013,51(01):257-272.

同被引文献3

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部