22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

74 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

In the case of NBN all jamming energy is placed into single channel, where<br />

activity of a communication system was detected.<br />

B. Tone jamming<br />

The next mentioned technique is tone jamming. In this type of jamming one<br />

or several tones are placed in the spectrum. When there is used only one tone,<br />

only one frequency is disrupted. If multi tones are applied, the tones are placed at<br />

previously chosen frequencies.<br />

C. Swept jamming<br />

Swept jamming technique is similar to broadb<strong>and</strong> or partial-b<strong>and</strong> noise<br />

jamming. Jamming can be realized by using narrow tone signal or PBN signal.<br />

In this technique relatively narrowb<strong>and</strong> signal is sweeping across part of spectrum.<br />

As a result of this, at any instant of time, only part of interesting b<strong>and</strong> is jammed.<br />

D. Pulse jamming<br />

Pulse jamming is similar to partial b<strong>and</strong> noise jamming. The main factor<br />

of pulse jamming is so called duty cycle, which means how long the jammer is switch<br />

on relative to switch off. The results of jamming strictly depend on the peak power<br />

<strong>and</strong> value of duty cycle.<br />

E. Smart jamming<br />

Smart jamming exploits weak sides of particular network, such as e.g. GSM<br />

or UMTS. Technique is based on assault on vulnerabilities e.g.: error correction<br />

checksums, messages related with acknowledgements, synchronization channels,<br />

time slots. Identification of a network type <strong>and</strong> synchronization in time are crucial<br />

for successful jamming. Known methods of attack include among others: station<br />

overloading, preventing positive call initiation, preventing from achieving connectivity,<br />

forged calls to the subscribers, disrupting communications by introducing<br />

errors into checksums, or distortions in messages related with acknowledgements.<br />

In this type of a jamming, the knowledge of transmission protocol is the key issue.<br />

F. Following jamming.<br />

Following jamming is usually applied against frequency hopping transmission.<br />

Such jammer search for emissions <strong>and</strong> when the signal is detected, it is jammed.<br />

The jammer follows carrier frequency changes of transmitted signal <strong>and</strong> continues<br />

jamming.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!