{"title":"卫星物联网干扰检测方法研究","authors":"G. Taricco, N. Alagha","doi":"10.1002/sat.1431","DOIUrl":null,"url":null,"abstract":"Despite the fast growth of machine‐type communications via satellite, the vulnerability of such networks to intentional interference and malicious jamming attacks is a raising concern. Specifically, in this paper, we address a class of jamming attacks in which the adversary uses the underlying knowledge of the satellite physical and access protocol to increase the jamming impact. In particular, we focused on a type of camouflage jamming attack (using publicly known preamble) to deceive the receiver, which rapidly leads to poor performance. Compared to conventional constant jamming attacks, these jamming strategies are known to be more effective and potentially more harmful to the targeted communication network. We analyze methods to detect such jamming attacks and provide examples of jamming detection techniques for the satellite Internet of Things (IoT) networks. Results indicate the effective performance of the jamming detection techniques for a variety of representative system parameters. More specifically, we introduce a simple (counting) jamming detection method along with numerical results for realistic system parameters, which confirms system design vulnerability as well as how the jammer may improve her strategy.","PeriodicalId":50289,"journal":{"name":"International Journal of Satellite Communications and Networking","volume":"40 1","pages":"177 - 190"},"PeriodicalIF":0.9000,"publicationDate":"2021-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"On jamming detection methods for satellite Internet of Things networks\",\"authors\":\"G. Taricco, N. Alagha\",\"doi\":\"10.1002/sat.1431\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Despite the fast growth of machine‐type communications via satellite, the vulnerability of such networks to intentional interference and malicious jamming attacks is a raising concern. Specifically, in this paper, we address a class of jamming attacks in which the adversary uses the underlying knowledge of the satellite physical and access protocol to increase the jamming impact. In particular, we focused on a type of camouflage jamming attack (using publicly known preamble) to deceive the receiver, which rapidly leads to poor performance. Compared to conventional constant jamming attacks, these jamming strategies are known to be more effective and potentially more harmful to the targeted communication network. We analyze methods to detect such jamming attacks and provide examples of jamming detection techniques for the satellite Internet of Things (IoT) networks. Results indicate the effective performance of the jamming detection techniques for a variety of representative system parameters. More specifically, we introduce a simple (counting) jamming detection method along with numerical results for realistic system parameters, which confirms system design vulnerability as well as how the jammer may improve her strategy.\",\"PeriodicalId\":50289,\"journal\":{\"name\":\"International Journal of Satellite Communications and Networking\",\"volume\":\"40 1\",\"pages\":\"177 - 190\"},\"PeriodicalIF\":0.9000,\"publicationDate\":\"2021-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Satellite Communications and Networking\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1002/sat.1431\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"ENGINEERING, AEROSPACE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Satellite Communications and Networking","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1002/sat.1431","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, AEROSPACE","Score":null,"Total":0}
On jamming detection methods for satellite Internet of Things networks
Despite the fast growth of machine‐type communications via satellite, the vulnerability of such networks to intentional interference and malicious jamming attacks is a raising concern. Specifically, in this paper, we address a class of jamming attacks in which the adversary uses the underlying knowledge of the satellite physical and access protocol to increase the jamming impact. In particular, we focused on a type of camouflage jamming attack (using publicly known preamble) to deceive the receiver, which rapidly leads to poor performance. Compared to conventional constant jamming attacks, these jamming strategies are known to be more effective and potentially more harmful to the targeted communication network. We analyze methods to detect such jamming attacks and provide examples of jamming detection techniques for the satellite Internet of Things (IoT) networks. Results indicate the effective performance of the jamming detection techniques for a variety of representative system parameters. More specifically, we introduce a simple (counting) jamming detection method along with numerical results for realistic system parameters, which confirms system design vulnerability as well as how the jammer may improve her strategy.
期刊介绍:
The journal covers all aspects of the theory, practice and operation of satellite systems and networks. Papers must address some aspect of satellite systems or their applications. Topics covered include:
-Satellite communication and broadcast systems-
Satellite navigation and positioning systems-
Satellite networks and networking-
Hybrid systems-
Equipment-earth stations/terminals, payloads, launchers and components-
Description of new systems, operations and trials-
Planning and operations-
Performance analysis-
Interoperability-
Propagation and interference-
Enabling technologies-coding/modulation/signal processing, etc.-
Mobile/Broadcast/Navigation/fixed services-
Service provision, marketing, economics and business aspects-
Standards and regulation-
Network protocols