کاهش تداخل واکنشی در جنگ الکترونیکی
ترجمه نشده

کاهش تداخل واکنشی در جنگ الکترونیکی

عنوان فارسی مقاله: Bittransfer: کاهش تداخل واکنشی در سناریوهای جنگ الکترونیکی
عنوان انگلیسی مقاله: Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
مجله/کنفرانس: دسترسی – IEEE Access
رشته های تحصیلی مرتبط: مهندسی برق، مهندسی فناوری اطلاعات و ارتباطات
گرایش های تحصیلی مرتبط: برق مخابرات، دیتا و امنیت شبکه
کلمات کلیدی فارسی: تداخل، جنگ الکترونیکی، امنیت سیستم ارتباطی، ارتباط بی سیم، پروتکل های ضد تداخلی، امنیت سیستم های سایبری – فیزیکی
کلمات کلیدی انگلیسی: Jamming, electronic warfare, communication system security, wireless communication, anti-jamming protocols, cyber-physical systems security
نوع نگارش مقاله: مقاله پژوهشی (Research Article)
شناسه دیجیتال (DOI): https://doi.org/10.1109/ACCESS.2019.2949716
دانشگاه: Division of Information and Computing Technology (ICT), College of Science and Engineering (CSE), Hamad Bin Khalifa University (HBKU), Doha, Qatar
صفحات مقاله انگلیسی: 16
ناشر: آی تریپل ای - IEEE
نوع ارائه مقاله: ژورنال
نوع مقاله: ISI
سال انتشار مقاله: 2019
ایمپکت فاکتور: 4.641 در سال 2018
شاخص H_index: 56 در سال 2019
شاخص SJR: 0.609 در سال 2018
شناسه ISSN: 2169-3536
شاخص Quartile (چارک): Q2 در سال 2018
فرمت مقاله انگلیسی: PDF
وضعیت ترجمه: ترجمه نشده است
قیمت مقاله انگلیسی: رایگان
آیا این مقاله بیس است: خیر
آیا این مقاله مدل مفهومی دارد: ندارد
آیا این مقاله پرسشنامه دارد: ندارد
آیا این مقاله متغیر دارد: ندارد
کد محصول: E13915
رفرنس: دارای رفرنس در داخل متن و انتهای مقاله
فهرست مطالب (انگلیسی)

Abstract

I. Introduction

II. Related Work

III. Scenario and Adversary Models

IV. The Bittransfer Protocol at Glance

V. Performance Assessment

Authors

Figures

References

بخشی از مقاله (انگلیسی)

Abstract

Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols—the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.

Introduction

Electronic Warfare (EW) scenarios involve a variety of powerful attacks against wired and wireless networks, where attackers use any meaningful tool to disrupt the operation of the communication infrastructure of the competing entities in the target area [1]. The increasing advancements in manufacturing and embedding technologies experienced in the last decade have boosted the effectiveness of EW systems and strategies, especially in the military application domain [2]. EW systems inspect thoroughly the electromagnetic environment in the target area, analyze the communication technologies used by the competing party, and design ad-hoc stealthy methods to shut them down and reduce organization and response capabilities of the contenders [3], [4]. In this context, jamming is still the most powerful and convenient Denial of Service (DoS) attack that can be performed to disrupt wireless communications [5]. By simply deploying a single device emitting noise at high power on the same channel used for ongoing wireless communications, any radio operation is disrupted, independently from the selected communication technology [6]. In addition, the commercial diffusion of low-cost and low-effort Software Defined Radios (SDRs) has further lowered the technological barrier necessary to launch jamming attacks [7]. Between the large number of jamming attacks that can be achieved, Reactive Jamming is the most effective and difficult to detect [8].