22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1: Concepts <strong>and</strong> Solutions for <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> Systems<br />

73<br />

impossible <strong>and</strong> meaningless, because it would block own radio links. Therefore<br />

it is, necessary to provide a selective distortion emission, based on information<br />

obtained from the electromagnetic spectrum monitoring.<br />

III. Jamming principles <strong>and</strong> techniques<br />

In this chapter we discuss basic techniques <strong>and</strong> parameters of jamming signal.<br />

In order to disrupt radio signals there are applied devices which ensure appropriate<br />

parameter values of jamming signals. The major parameter determining the degree<br />

to which jamming will be successful is jamming (J) to signal (S) ratio JSR, described<br />

by the general formula shown below [5]<br />

JSR[dBm] = ERP J – ERP S – L J + L S + G RJ – G R (1)<br />

ERP J – effective radiated power of jamming station in dBm;<br />

ERP S – effective radiated power of transmitter signal in dBm;<br />

L J – propagation loss from jamming station in dB;<br />

– propagation loss from transmitter signal in dB;<br />

L S<br />

G RJ<br />

G R<br />

– jammed receiver antenna gain in the direction of jamming station in dBi;<br />

– jammed receiver antenna gain in the direction of transmitter station in dBi.<br />

The minimum value of JSR is dependent on the signal type which is jammed,<br />

signal propagation <strong>and</strong> jamming technique.<br />

Jammer designers can use various techniques of jamming. All techniques<br />

have their own advantages <strong>and</strong> disadvantages <strong>and</strong> application each of them is directly<br />

associated with type of jammed signal. The basic techniques include: noise<br />

jamming, tone jamming, swept jamming, pulse jamming, follower jamming <strong>and</strong><br />

smart jamming [3].<br />

A. Noise jamming<br />

Noise jamming is based on jamming carrier signal which is modulated with<br />

a r<strong>and</strong>om (Gaussian) noise waveform. This technique causes disruption of communication<br />

between transmitter <strong>and</strong> receiver by inserting high level noise. A b<strong>and</strong>width<br />

of jamming signal can have different width. Depending on the b<strong>and</strong>width occupied<br />

by noise jamming signal, it can be distinguished the following types of signals:<br />

broadb<strong>and</strong> noise (BBN), partial-b<strong>and</strong> noise (PBN) <strong>and</strong> narrowb<strong>and</strong> noise (NBN).<br />

BBN places noise energy inside entire b<strong>and</strong>width used by the communication<br />

system which is planned to jam. Generally BBN jamming signals fills the channel<br />

capacity. If the noise power is raised by inserting BBN signals into the channel,<br />

the signal to noise decrease <strong>and</strong> according to Shannon theorem, channel capacity<br />

also decrease [4].<br />

PBN places noise energy inside multiple channels indicated to disrupt.<br />

The channels may be contiguous or noncontiguous.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!