ECCM networking research

Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radi...

Full description

Bibliographic Details
Main Author: Chang, Eugene King
Other Authors: Lam, Alex W.
Language:en_US
Published: Monterey, California. Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/30805
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-30805
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-308052014-11-27T16:17:42Z ECCM networking research Chang, Eugene King Lam, Alex W. Wadsworth, Donald V. Z. Naval Postgraduate School (U.S.) Electrical and Computer Engineering Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radio systems. These systems are identical to the military systems except that they employ much simpler spreading code design and have less security incorporated. However, due to the economies of scale, they can be produced at a much lower cost than their military counterparts. The jamming vulnerability of such commercial products in tactical situations is analyzed in this thesis. The mobile cellular network developed by Qualcomm Inc. is used to illustrate the methodology in analyzing the effects of jamming on the mobile cellular network. With a single mobile station and jammer, the probability of jamming and the optimal jammer trajectory are derived. Next, the effective probabilities of detection and false alarm under the jamming conditions are derived and the mean acquisition times are compared to that without jamming. Our results show that intelligence jamming can cause devastating effects even with very small power. Commercial products are therefore much more vulnerable due to the simplicity in design. 2013-04-26T18:58:34Z 2013-04-26T18:58:34Z 1994-12 Thesis http://hdl.handle.net/10945/30805 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
language en_US
sources NDLTD
description Spread -spectrum modulation techniques, which are traditionally applied to military systems to enhance their Electronic Counter Counter Measures (ECCM) capabilities, are beginning to appear in the commercial secular. Specifically, spread-spectrum technology is being employed in digital cellular radio systems. These systems are identical to the military systems except that they employ much simpler spreading code design and have less security incorporated. However, due to the economies of scale, they can be produced at a much lower cost than their military counterparts. The jamming vulnerability of such commercial products in tactical situations is analyzed in this thesis. The mobile cellular network developed by Qualcomm Inc. is used to illustrate the methodology in analyzing the effects of jamming on the mobile cellular network. With a single mobile station and jammer, the probability of jamming and the optimal jammer trajectory are derived. Next, the effective probabilities of detection and false alarm under the jamming conditions are derived and the mean acquisition times are compared to that without jamming. Our results show that intelligence jamming can cause devastating effects even with very small power. Commercial products are therefore much more vulnerable due to the simplicity in design.
author2 Lam, Alex W.
author_facet Lam, Alex W.
Chang, Eugene King
author Chang, Eugene King
spellingShingle Chang, Eugene King
ECCM networking research
author_sort Chang, Eugene King
title ECCM networking research
title_short ECCM networking research
title_full ECCM networking research
title_fullStr ECCM networking research
title_full_unstemmed ECCM networking research
title_sort eccm networking research
publisher Monterey, California. Naval Postgraduate School
publishDate 2013
url http://hdl.handle.net/10945/30805
work_keys_str_mv AT changeugeneking eccmnetworkingresearch
_version_ 1716725101261488128