Overview of Electronic Attacks against Passive Radar

被引:0
|
作者
O'Hagan, Daniel W. [1 ]
Paine, Stephen [2 ]
Schuepbach, Christof [3 ]
机构
[1] Fraunhofer Inst High Frequency Phys & Radar Tech, Wachtberg, Germany
[2] Univ Cape Town, Radar Remote Sensing Grp, Cape Town, South Africa
[3] Armasuisse Sci Technol, Thun, Switzerland
关键词
Passive Radar; PCL; Jamming; Electronic Attack; FM; DVB-T; DAB;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Passive radars (PR) are becoming more popular in both commercial and research environments. If, as they are expected to, become deployed in military surveillance applications, their vulnerability to electronic attacks (EA) needs to be thoroughly investigated. This paper presents aspects of countering FM, DAB and DVB-T based PR systems using various attack strategies. The effects of various jamming waveforms are investigated. It is shown that under certain conditions, successful EA can be achieved with relatively low power. We demonstrate the importance of a direct signal canceller which causes a FM based PR system to be more tolerant to jamming when the reference and surveillance antennas are co-located as opposed to being separated.
引用
收藏
页数:2
相关论文
共 50 条
  • [41] Radar applications overview
    Greenspan, M
    RADAR SENSOR TECHNOLOGY, 1996, 2747 : 2 - 7
  • [42] An overview of passive RFID
    Chawla, Vipul
    Ha, Dong Sam
    IEEE COMMUNICATIONS MAGAZINE, 2007, : 11 - 17
  • [43] Denial of Service Attacks: An Overview
    Zlomislic, Vinko
    Fertalj, Kresimir
    Sruk, Vlado
    PROCEEDINGS OF THE 2014 9TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI 2014), 2014,
  • [44] Overview of SIP Attacks and Countermeasures
    El-moussa, Fadi
    Mudhar, Parmindher
    Jones, Andy
    INFORMATION SECURITY AND DIGITAL FORENSICS, 2010, 41 : 82 - +
  • [45] Mitigating Phishing Attacks: An Overview
    Sumner, Alex
    Yuan, Xiaohong
    PROCEEDINGS OF THE 2019 ANNUAL ACM SOUTHEAST CONFERENCE (ACMSE 2019), 2019, : 72 - 77
  • [46] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Huang, Qiong
    Wong, Duncan S.
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 807 - 826
  • [47] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    黄琼
    王石
    JournalofComputerScience&Technology, 2010, 25 (04) : 807 - 823
  • [48] A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks
    Yang, Wenjie
    Weng, Jian
    Huang, Xinyi
    Yang, Anjia
    COMPUTER JOURNAL, 2020, 63 (08): : 1139 - 1147
  • [49] Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model
    Qiong Huang
    Duncan S. Wong
    Journal of Computer Science and Technology, 2010, 25 : 807 - 826
  • [50] Selective Cross Correlation in Passive Timing Analysis Attacks against Low-Latency Mixes
    Abraham, Titus
    Wright, Matthew
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,