Optimizing Jamming Attacks in Cyber Electronic Warfare Based on Real Time Situational Awareness
2019
- 109Usage
Metric Options: CountsSelecting the 1-year or 3-year option will change the metrics count to percentiles, illustrating how an article or review compares to other articles or reviews within the selected time period in the same journal. Selecting the 1-year option compares the metrics against other articles/reviews that were also published in the same calendar year. Selecting the 3-year option compares the metrics against other articles/reviews that were also published in the same calendar year plus the two years prior.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Example: if you select the 1-year option for an article published in 2019 and a metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019. If you select the 3-year option for the same article published in 2019 and the metric category shows 90%, that means that the article or review is performing better than 90% of the other articles/reviews published in that journal in 2019, 2018 and 2017.
Citation Benchmarking is provided by Scopus and SciVal and is different from the metrics context provided by PlumX Metrics.
Metrics Details
- Usage109
- Abstract Views109
Poster Description
Developing of capability to launch attacks based on situational awareness of the communication environment. Specifically, the capability will corrupt control messages exchanged between base station and mobile device to impair mobile communications. This capability will allow the development of cross-layer attack solutions which leverages and extracts intelligence from communication protocol messages to selectively and stealthily impair mobile communications with low power. The capability will implemented in an integrated SDR and embedded system environment that is portable, ruggedized and mobile.The cross-layer attack capability will involve a passive sniffer which can eavesdrop on the communication between base station and mobile device to extract data link and network layer messages. The messages will be analyzed to extract communication and network information needed to launch low-power attacks on multiple mobile devices. We have instrumented a SDR testbed to fit in a backpack capable of passively sniffing mobile communication and networking protocol messages. The proposed approach will automate the process of extracting communication channels, hopping parameters, network topology by analyzing cross-layer messages.The testbed is equipped with cross-layer attack capability will be delivered. The testbed primarily comprises of four SDRs, four embedded computing devices and associated software. The SDRs would be instrumented with the ability to detect control channels in the region where it is deployed and transmit low power messages to impair the communication between the mobile device and base station.
Bibliographic Details
Provide Feedback
Have ideas for a new metric? Would you like to see something else here?Let us know