期刊文献+

基于整网效果的战术互联网干扰效果的评估方法

Evaluation Method of Jamming Effectiveness of Tactical Internet Based on Whole Network Effect
下载PDF
导出
摘要 以往针对战术互联网的干扰更侧重于网络中单链路和单网的效果,对于整个战术互联网干扰效果评估的研究较少。本文在分析战术互联网组成与特点的基础上,提出了一种基于整网效果的战术互联网干扰效果评估方法,最后通过软件实现了对战术互联网干扰效果的评估。 The previous interference in the Tactical Internet is more focused on the effect of single chain and single network in the network,and there are few studies on the effectiveness of the whole Tactical Internet interference. Based on the analysis of the composition and characteristics of the Tactical Internet,this paper puts forward a method of evaluating the effect of the Tactical Internet interference based on the whole net effect. Finally,the effect of the Tactical Internet interference is evaluated by the software.
作者 李红领 陈颖颖 张增 LI Hongling;CHEN Yingying;ZHANGZeng(Department of Information and Communications,Army Armored Force Academy,Beijing 100072,China)
出处 《现代信息科技》 2018年第8期73-75,共3页 Modern Information Technology
关键词 战术互联网 干扰效果 指标体系 评估算法 Tactical Internet jamming effect index system evaluation algorithm
  • 相关文献

参考文献4

二级参考文献23

  • 1袁培燕,李腊元,袁秋林.NS2错误模型的改进[J].计算机工程与设计,2007,28(3):569-571. 被引量:2
  • 2Department of the Army Washington. Tactical Tactics Techniques, and Procedures for the Tactical Internet[EB/OL] (1999-07-11) [2011-03-22]. http://www, armymars, net/ArmyMARS/ MiiInfo/ 32-Tactical-lnternet/Toev6. pdf.
  • 3Department of the Army Washington. Tactics, Techniques, and Procedures for the Enhanced Position Location Reporting System (EPLRS) [R].USA:Department of the Amy Washing. 1999.
  • 4PAUL S. Communications Networks for the Force XXI Digitized Battlefield[J]. Mobile Networks and Applications, 1999(04): 139-155.
  • 5薛泉林.国外战术电台的发展概况及其动向.通信技术,1984,(1):127-136.
  • 6尤曾录.战术互联网[M].北京:解放军出版社,2010.
  • 7SATRIA M,KOMMINENI J. Quantifying the severity ofblackhole attack in wireless mobile adhoc networks[C]//Second International Symposium(SSCC). Berlin Heidelberg:Springer-Verlag,2014,467:57-67.
  • 8GUNHEE L,WONIL K,KANGSEOK K,et al. An approachto mitigate DoS a ttack based on routing misbehavior inwireless ad hoc networks[J].Peer-to-Peer Networking andApplications,2013(8):684-693.
  • 9MOHANAPRIYA M,KRISHNAMURTHI I. Trust basedDSR routing protocol for mitigating cooperative black holeattacks in ad hoc networks[J].Arabian Journal for Scienceand Engineering,2013,39(3):1825-1833.
  • 10NOUBIR G. On connectivity in ad hoc networks under jammingusing directional antennas and mobility[C]// InternationalConference on Wired/Wireless Internet Communications.LNCS 2957,Berlin,Heidelberg: Springer-Verlag,2004.521-532.

共引文献41

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部