期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
iJam密钥产生方案的双窃听者合作攻击 被引量:3
1
作者 贾仁庆 吴晓富 朱卫平 《信号处理》 CSCD 北大核心 2016年第1期91-97,共7页
iJam是一种与信道变化快慢无关、且能够快速生成物理层密钥的新技术。在i Jam方案中,发送者连续发送两份相同的OFDM符号,接收者随机干扰每对采样点中的一个。合法接收者可以利用干扰信息重构密钥信息,而窃听者因不知干扰符号的位置而无... iJam是一种与信道变化快慢无关、且能够快速生成物理层密钥的新技术。在i Jam方案中,发送者连续发送两份相同的OFDM符号,接收者随机干扰每对采样点中的一个。合法接收者可以利用干扰信息重构密钥信息,而窃听者因不知干扰符号的位置而无法进行有效重构。然而,i Jam方案的安全性与窃听者的位置紧密相关。尽管i Jam采取双向交换密钥等机制克服了单窃听者的位置敏感问题,但是i Jam方案的安全问题仍然存在。为攻击i Jam,本文提出了一种双窃听者合作攻击方法,两个分别位于Alice、Bob端的窃听者合作对i Jam进行攻击。仿真结果表明:双窃听者合作攻击方法可有效破解合法用户协商的密钥。 展开更多
关键词 物理层安全 iJam方案 双窃听者合作攻击
下载PDF
双机合作下的远程空空导弹攻击技术 被引量:7
2
作者 张斌 黄俊 +1 位作者 寇英信 于雷 《火力与指挥控制》 CSCD 北大核心 2009年第5期92-94,共3页
探讨了双机合作条件下远程空空导弹的攻击技术。首先描述了双机合作下时间对准的方法和数据延时的处理,然后给出了空间对准的具体坐标转换公式,最后以基准制导坐标系为基础建立了无线电修正指令的矢量图,用矢量方程法推导了无线电修正... 探讨了双机合作条件下远程空空导弹的攻击技术。首先描述了双机合作下时间对准的方法和数据延时的处理,然后给出了空间对准的具体坐标转换公式,最后以基准制导坐标系为基础建立了无线电修正指令的矢量图,用矢量方程法推导了无线电修正指令的形成过程。 展开更多
关键词 远程空空导弹 合作攻击 时空对准 矢量方程
下载PDF
CPN攻击建模及警报相关性算法设计 被引量:1
3
作者 杜建军 吴中福 陈明 《重庆大学学报(自然科学版)》 EI CAS CSCD 北大核心 2011年第4期118-124,共7页
为提高当前入侵检测系统的预警质量和分析预测能力,用染色Petri网(colored petrinet,CPN)构造了攻击模型,系统性地设计了警报信息相关性分析算法。通过把'警报'和'攻击'作为2个不同实体参与模型运算,将目前主要采用的... 为提高当前入侵检测系统的预警质量和分析预测能力,用染色Petri网(colored petrinet,CPN)构造了攻击模型,系统性地设计了警报信息相关性分析算法。通过把'警报'和'攻击'作为2个不同实体参与模型运算,将目前主要采用的过滤观察信息为基础的关联方法提升为信息推理的演算方法。应用CPN模型转换、极小覆盖集命题等方法,对本领域中的难点问题即复合攻击、合作攻击进行了理论分析和算法设计。在此基础上开发了警报信息相关性分析(alerts correlation analysis system,ACAS)实验系统,实验结果表明算法系统对于提高入侵检测系统的警报质量和分析预测能力是可行、有效的。 展开更多
关键词 入侵检测 染色Petri网 攻击建模 警报相关性 合作攻击
下载PDF
A game-theory approach against Byzantine attack in cooperative spectrum sensing
4
作者 Wu Jun Song Tiecheng +1 位作者 Yu Yue Hu Jing 《Journal of Southeast University(English Edition)》 EI CAS 2018年第4期423-429,共7页
In order to solve the Byzantine attack problem in cooperative spectrum sensing,a non-cooperative game-theory approach is proposed to realize an effective Byzantine defense.First,under the framework of the proposed non... In order to solve the Byzantine attack problem in cooperative spectrum sensing,a non-cooperative game-theory approach is proposed to realize an effective Byzantine defense.First,under the framework of the proposed non-cooperative game theory,the pure Byzantine attack strategy and defense strategy in cooperative spectrum sensing are analyzed from the perspective of the Byzantine attacker and network administrator.The cost and benefit of the pure strategy on both sides are defined. Secondly,the mixed attack and defense strategy are also derived. The closed form Nash equilibrium is obtained by the Lemke-Howson algorithm. Furthermore,the impact of the benefit ratio and penalty rate on the dynamic process of the noncooperative game is analyzed. Numerical simulation results show that the proposed game-theory approach can effectively defend against the Byzantine attack and save the defensive cost. 展开更多
关键词 cooperative spectrum sensing Byzantine attack game theory non-cooperative game Nash equilibrium
下载PDF
Multi-Objective Cooperative Salvo Attack Against Group Target 被引量:7
5
作者 ZENG Jie DOU Lihua XIN Bin 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2018年第1期244-261,共18页
This paper proposes a solution for the problem of cooperative salvo attack of multiple cruise missiles against targets in a group. Synchronization of the arrival time of missiles to hit their common target, minimizing... This paper proposes a solution for the problem of cooperative salvo attack of multiple cruise missiles against targets in a group. Synchronization of the arrival time of missiles to hit their common target, minimizing the time consumption of attack and maximizing the expected damage to group targets are taken into consideration simultaneously. These operational objectives result in a hierarchical mixed-variable optimization problem which includes two types of subproblems, namely the multi-objective missile-target assignment(MOMTA) problem at the upper level and the time-optimal coordinated path planning(TOCPP) problems at the lower level. In order to solve the challenging problem, a recently proposed coordinated path planning method is employed to solve the TOCPP problems to achieve the soonest salvo attack against each target. With the aim of finding a more competent solver for MOMTA, three state-of-the-art multi-objective optimization methods(MOMs),namely NSGA-II, MOEA/D and DMOEA-εC, are adopted. Finally, a typical example is used to demonstrate the advantage of the proposed method. A simple rule-based method is also employed for comparison. Comparative results show that DMOEA-εC is the best choice among the three MOMs for solving the MOMTA problem. The combination of DMOEA-εC for MOMTA and the coordinated path planning method for TOCPP can generate obviously better salvo attack schemes than the rule-based method. 展开更多
关键词 Coordinated path planning missile-target assignment multi-missile salvo attack multiobjective optimization
原文传递
The Sino-US Relations and Alliance Structures in Northeast Asia
6
作者 Shen Ding-li 《Fudan Journal of the Humanities and Social Sciences》 2009年第4期1-27,共27页
This paper addresses the issue of security alliances in Northeast Asia--their origins and current status. It observes some fundamental changes of such alliances in the region with the change of time, and concludes tha... This paper addresses the issue of security alliances in Northeast Asia--their origins and current status. It observes some fundamental changes of such alliances in the region with the change of time, and concludes that the present alliances are still hedging against uncertainty. In particular, it elaborates the legitimacy of alliance due to collective defense, rather than cooperative aggressiveness that erodes the credibility of alliance and leads to distrust of nations. The paper raises the Taiwan Question and DPRK issue as key examples to analyze how China and the US have entered a strategically distrustful relationship and how these two issues have been intertwined. It also discusses how to de-link them and build a more stable and secure relationship between China and the US through forward-looking cooperation. 展开更多
关键词 China-US relations ALLIANCE Northeast Asia Taiwan Question
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部