ECCM networking research
Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radi...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
Monterey, California. Naval Postgraduate School
2013
|
Online Access: | http://hdl.handle.net/10945/30805 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-30805 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-308052014-11-27T16:17:42Z ECCM networking research Chang, Eugene King Lam, Alex W. Wadsworth, Donald V. Z. Naval Postgraduate School (U.S.) Electrical and Computer Engineering Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radio systems. These systems are identical to the military systems except that they employ much simpler spreading code design and have less security incorporated. However, due to the economies of scale, they can be produced at a much lower cost than their military counterparts. The jamming vulnerability of such commercial products in tactical situations is analyzed in this thesis. The mobile cellular network developed by Qualcomm Inc. is used to illustrate the methodology in analyzing the effects of jamming on the mobile cellular network. With a single mobile station and jammer, the probability of jamming and the optimal jammer trajectory are derived. Next, the effective probabilities of detection and false alarm under the jamming conditions are derived and the mean acquisition times are compared to that without jamming. Our results show that intelligence jamming can cause devastating effects even with very small power. Commercial products are therefore much more vulnerable due to the simplicity in design. 2013-04-26T18:58:34Z 2013-04-26T18:58:34Z 1994-12 Thesis http://hdl.handle.net/10945/30805 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
description |
Spread -spectrum modulation techniques, which are traditionally applied to military
systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are
beginning to appear in the commercial secular. Specifically, spread-spectrum technology
is being employed in digital cellular radio systems. These systems are identical to the
military systems except that they employ much simpler spreading code design and have
less security incorporated. However, due to the economies of scale, they can be produced at a much lower cost than their military counterparts. The jamming vulnerability of such commercial products in tactical situations is analyzed in this thesis. The mobile cellular network developed by Qualcomm Inc. is used to illustrate the methodology in analyzing the effects of jamming on the mobile cellular network. With a single mobile station and jammer, the probability of jamming and the optimal jammer trajectory are derived. Next, the effective probabilities of detection and false alarm under the jamming conditions are derived and the mean acquisition times are compared to that without jamming. Our results show that intelligence jamming can cause devastating effects even with very small power. Commercial products are therefore much more vulnerable due to the simplicity in design. |
author2 |
Lam, Alex W. |
author_facet |
Lam, Alex W. Chang, Eugene King |
author |
Chang, Eugene King |
spellingShingle |
Chang, Eugene King ECCM networking research |
author_sort |
Chang, Eugene King |
title |
ECCM networking research |
title_short |
ECCM networking research |
title_full |
ECCM networking research |
title_fullStr |
ECCM networking research |
title_full_unstemmed |
ECCM networking research |
title_sort |
eccm networking research |
publisher |
Monterey, California. Naval Postgraduate School |
publishDate |
2013 |
url |
http://hdl.handle.net/10945/30805 |
work_keys_str_mv |
AT changeugeneking eccmnetworkingresearch |
_version_ |
1716725101261488128 |