{"title":"提出了实现抗智能干扰的扩频通信系统的建议","authors":"M. D. Noes","doi":"10.1109/VNC.2017.8275599","DOIUrl":null,"url":null,"abstract":"Spread spectrum transmission is presented as an anti-jamming alternative for ITS. In this article, the vulnerability of this technology to eavesdropping, and consequently jamming, is highlighted. Applying an iterative message-passing algorithm, it is possible to estimate the initial state of an m-sequence or Gold sequence generator, and hence be able to generate the same spreading sequence as the target user. As a result, an attacker can generate a valid jamming signal which will be difficult to detect at the physical layer. The practicability and efficiency of this attack depend on some properties of these sequences: number and smallest degree of low weight parity check equations. These two properties are analyzed and exploited to provide some recommendations for the implementation of a practical spread spectrum communication system. Eventually, simulation results show the feasibility of this attack.","PeriodicalId":101592,"journal":{"name":"2017 IEEE Vehicular Networking Conference (VNC)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Recommendations for the implementation of a practical spread spectrum communication system robust against smart jamming\",\"authors\":\"M. D. Noes\",\"doi\":\"10.1109/VNC.2017.8275599\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Spread spectrum transmission is presented as an anti-jamming alternative for ITS. In this article, the vulnerability of this technology to eavesdropping, and consequently jamming, is highlighted. Applying an iterative message-passing algorithm, it is possible to estimate the initial state of an m-sequence or Gold sequence generator, and hence be able to generate the same spreading sequence as the target user. As a result, an attacker can generate a valid jamming signal which will be difficult to detect at the physical layer. The practicability and efficiency of this attack depend on some properties of these sequences: number and smallest degree of low weight parity check equations. These two properties are analyzed and exploited to provide some recommendations for the implementation of a practical spread spectrum communication system. Eventually, simulation results show the feasibility of this attack.\",\"PeriodicalId\":101592,\"journal\":{\"name\":\"2017 IEEE Vehicular Networking Conference (VNC)\",\"volume\":\"129 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE Vehicular Networking Conference (VNC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/VNC.2017.8275599\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Vehicular Networking Conference (VNC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/VNC.2017.8275599","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Recommendations for the implementation of a practical spread spectrum communication system robust against smart jamming
Spread spectrum transmission is presented as an anti-jamming alternative for ITS. In this article, the vulnerability of this technology to eavesdropping, and consequently jamming, is highlighted. Applying an iterative message-passing algorithm, it is possible to estimate the initial state of an m-sequence or Gold sequence generator, and hence be able to generate the same spreading sequence as the target user. As a result, an attacker can generate a valid jamming signal which will be difficult to detect at the physical layer. The practicability and efficiency of this attack depend on some properties of these sequences: number and smallest degree of low weight parity check equations. These two properties are analyzed and exploited to provide some recommendations for the implementation of a practical spread spectrum communication system. Eventually, simulation results show the feasibility of this attack.