Filtry
wszystkich: 31
Wyniki wyszukiwania dla: JAMMING
-
Jamming and jamming mitigation for selected 5G military scenarios
PublikacjaThis paper presents jamming and jamming mitigation techniques, which can be used in relation to emerging military systems based on fifth-generation (5G) technology. Nowadays, 5G technology provides incremental improvements over Long Term Evolution (LTE) networks resulting in the enhancement of civilian communications. Considering enormous possible applications of this new technology, it is feasible to use them in military utilities....
-
Reception of GNSS Signals Under Jamming Conditions
PublikacjaThe article focuses on performance of Global Navigation Satellite System receivers in environment where intentional interference is present. First part is a general description of GNSS systems. Secondly, types of positioning service disturbances are specified. In the third part authors present a scheme of measurement stand which is used to evaluate the influence of interference on reception of navigation signals. Next, research...
-
Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Electromagnetic compatibility tests of warship antitorpedo jamming system
PublikacjaW artykule przedstawiono zagadnienie interferencji elektromagnetycznych na okręcie wojennym spowodowanych pracą antytorpedowego systemu zakłócającego. W warunkach laboratoryjnych, dla wybranej konfiguracji systemu, zostały przeprowadzone badania kompatybilnościowe i na podstawie otrzymanych rezultatów zostały sformułowane wnioski praktyczne.
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublikacjaThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Wideband Signal Generation for Jamming Radio-Controlled Improvised Explosive Devices
PublikacjaThis paper focuses on modelling operation of a wideband jamming signal generator, considering the effects present in real device which influence the shape of transmitted signal’s spectrum. Introduction is followed by a brief overview of AEGIS project, aim of which is to develop a mobile generator of electromagnetic curtain. Next, simulation model is described which includes the factors...
-
From flow to jamming: Lattice Gas Automaton simulations in granular materials
PublikacjaWe introduce the first extension of a Lattice Gas Automaton (LGA) model to accurately replicate observed emergent phenomena in granular materials with a special focus on previously unexplored jamming transitions by incorporating gravitational effects, energy dissipation in particle collisions, and wall friction. We successfully reproduce flow rate evolution, density wave formation, and jamming transition observed in experiments....
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
PublikacjaThis work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...
-
Shear-Jamming in Two-Dimensional Granular Materials with Power-Law Grain-Size Distribution
Publikacja -
Cybersecurity of the Unmanned Marine Vehicles in the Conditions of Partial or Complete Interruption Multi-GNSS Signals by Jamming and/or Spoofing
Publikacja -
Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces
PublikacjaFourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analytical work shows that it has numerous technological gaps that prevent its direct implementation in military communications systems. However, the recent armed world conflicts showed that...
-
Examination of 5G NR, LTE, and NB-IoT Radio Interfaces and Their Vulnerabilities to Interference
PublikacjaModern cellular wireless communication systems of the fourth (4G) and fifth generation (5G) face a problem of various types of interference or intentional jamming. Consequently, a degradation of the services provided and an incorrect network operation may occur. In this paper, configuration of the networks’ physical layer is investigated, with the said investigation preceded by the measurement of parameters of commercial networks...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT
PublikacjaW artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...
-
Assessment of the ice jam potential on regulated rivers and reservoirs with the use of numerical model results
PublikacjaThis study presents an attempt at estimating the jam potential on rivers with significant anthropogenic intervention in the course or flow characteristics of the river. The DynaRiCE model was used for forecasting both the place and time of an ice jam occurrence. In this modified method, two ice parameters are subjected to analysis, namely the relative ice-to-water velocity (vi/vw),and the ice thickness to single floe thickness...
-
Sonar Pulse Detection Using Chirp Rate Estimation and CFAR Algorithms
PublikacjaThis paper presents a new approach to sonar pulse detection. The method uses chirp rate estimators and algorithms for the adaptive threshold, commonly used in radiolocation. The proposed approach allows detection of pulses of unknown parameters, which may be used in passive hydrolocation or jamming detection in underwater communication. Such an analysis is possible thanks to a new kind of imaging, which presents signal energy in...
-
Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych
PublikacjaIn the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...
-
Numerical Modeling of Water and Ice Dynamics for Analysis of Flow Around the Kiezmark Bridge Piers
PublikacjaThis paper presents the results of a numerical model study on the effect of ice on the proposed bridge piers in the Vistula River outlet and its effect on flow conditions in the river. The model DynaRICE is used in this study, which is a two-dimensional hydro-ice dynamic numerical model developed for dynamic ice transport and jamming in rivers. To simulate river hydrodynamics in the vicinity of the bridge piers, 2-dimensional numerical...
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublikacjaIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
System wykrywania i przeciwdziałania spoofingowi GPS
PublikacjaSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Demonstrator technologii C-IED
PublikacjaArtykuł przedstawia budowę i działanie opracowanego na Politechnice Gdańskiej demonstratora technologicznego systemu AEGIS, przeznaczonego do przeciwdziałania atakom z wykorzystaniem prowizorycznych urządzeń wybuchowych detonowanych drogą radiową (RCIED — Radio Controlled Improvised Explosive Devices). Przedstawiono zaimplementowaną oryginalną metodę generowania sygnału zagłuszającego o dowolnie ukształtowanym widmie częstotliwościowym,...
-
Celowe zanieczyszczanie pilotów w łączu w górę w interfejsie 5G NR
PublikacjaReferat poświęcono zagadnieniu zakłócania sygnałów pilotowych w interfejsie radiowym 5G NR. Przedstawiono charakterystykę sygnału referencyjnego DMRS oraz uwarunkowania możliwości jego selektywnego zakłócenia. Opisano schemat transmisji w kanale fizycznym PUSCH, zaimplementowany w oprogramowaniu Sionna. Zaprezen-towano model symulacyjny oraz założenia badań wpływu zanieczyszczenia pilotów na jakość transmisji. Przedsta-wiono wyniki...
-
ON EGNOS MONITORING IN LOCAL CONDITIONS
PublikacjaAny SBAS system should deliver to the user corrections to pseudoranges as well as information about the system integrity. In theory, as soon as the system is permanently monitored by RIMS stations, it is impossible to deliver the fault information to the user. However many observations shows that accuracy of EGNOS service in the same time are different in different places, which shows the influence of local conditions on them....
-
Ochrona odbiorników GNSS przed zakłóceniami celowymi
PublikacjaArtykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublikacjaThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
Has EGNOS its own place in maritime navigation?
PublikacjaGNSS (in fact it usually means GPS) is at the moment the fundamental means of positioning for any variants of navigation. However some attributes of it can be not sufficient for every users or in some tasks, so there are any cases when this system needs support. From the mariner point of view pure GPS properties perfectly fulfils expectations of sailors at the open sea, however there are lot of cases, when accuracy of the system...