13 research outputs found

    An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

    Get PDF
    Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is essential to send/receive messages without any interruptions to control the vehicles remotely. In wireless vehicular ad hoc networks (VANET), the attacker’s mission is more accessible due to the network’s open nature, way of communication, and lack of security measures. Most of the existing studies have focused on jamming detection approaches. However, few of them have addressed the jammer localization challenge. Moreover, even in these limited studies, the solutions’ assumptions, the proposed countermeasures, and their complexity were also missing. Therefore, this paper introduces a new approach to detecting, localizing, and avoiding jamming attacks in VANETs with high efficiency in terms of accuracy, implementation and complexity. The proposed approach uses the signal strength of the jammer for estimating only the distance between jammer and receiver, while then a less complex algorithm is proposed for localizing the jammer and then redirecting the vehicles away from the roads the attacker is using. This approach was simulated using real-life maps and specialized network environments. Additionally, the performance of the new approach was evaluated using different metrics. These evaluation metrics include (1) the estimated position of the jammer, (2) the handling of the jammer by announcing its location to normal vehicles (3) the avoidance of the jammed routes by increasing their weight, which forces the cars to reroute and evade the jamming area. The high localization accuracy, measured by the Euclidean distance, and the successful communication of the attacker’s position and its avoidance have highly increased the packet delivery ratio (PDR) and the signal-to-interference-plus-noise ratio (SINR). This was noticed significantly before and after avoiding the jamming area when for example, the PDR increased from 0% to 100% before and after bypassing the jammer’s routes

    An Efficient Localization and Avoidance Method of Jammers in Vehicular Ad Hoc Networks

    Get PDF
    Jamming is a terrifying attack that could harm 802.11p-based vehicular communications by occupying the communication channels by overwhelming the network with jamming packets, especially for self-driving cars, as it is essential to send/receive messages without any interruptions to control the vehicles remotely. In wireless vehicular ad hoc networks (VANET), the attacker’s mission is more accessible due to the network’s open nature, way of communication, and lack of security measures. Most of the existing studies have focused on jamming detection approaches. However, few of them have addressed the jammer localization challenge. Moreover, even in these limited studies, the solutions’ assumptions, the proposed countermeasures, and their complexity were also missing. Therefore, this paper introduces a new approach to detecting, localizing, and avoiding jamming attacks in VANETs with high efficiency in terms of accuracy, implementation and complexity. The proposed approach uses the signal strength of the jammer for estimating only the distance between jammer and receiver, while then a less complex algorithm is proposed for localizing the jammer and then redirecting the vehicles away from the roads the attacker is using. This approach was simulated using real-life maps and specialized network environments. Additionally, the performance of the new approach was evaluated using different metrics. These evaluation metrics include (1) the estimated position of the jammer, (2) the handling of the jammer by announcing its location to normal vehicles (3) the avoidance of the jammed routes by increasing their weight, which forces the cars to reroute and evade the jamming area. The high localization accuracy, measured by the Euclidean distance, and the successful communication of the attacker’s position and its avoidance have highly increased the packet delivery ratio (PDR) and the signal-to-interference-plus-noise ratio (SINR). This was noticed significantly before and after avoiding the jamming area when for example, the PDR increased from 0% to 100% before and after bypassing the jammer’s routes

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    Unmanned Vehicle Systems & Operations on Air, Sea, Land

    Get PDF
    Unmanned Vehicle Systems & Operations On Air, Sea, Land is our fourth textbook in a series covering the world of Unmanned Aircraft Systems (UAS) and Counter Unmanned Aircraft Systems (CUAS). (Nichols R. K., 2018) (Nichols R. K., et al., 2019) (Nichols R. , et al., 2020)The authors have expanded their purview beyond UAS / CUAS systems. Our title shows our concern for growth and unique cyber security unmanned vehicle technology and operations for unmanned vehicles in all theaters: Air, Sea and Land – especially maritime cybersecurity and China proliferation issues. Topics include: Information Advances, Remote ID, and Extreme Persistence ISR; Unmanned Aerial Vehicles & How They Can Augment Mesonet Weather Tower Data Collection; Tour de Drones for the Discerning Palate; Underwater Autonomous Navigation & other UUV Advances; Autonomous Maritime Asymmetric Systems; UUV Integrated Autonomous Missions & Drone Management; Principles of Naval Architecture Applied to UUV’s; Unmanned Logistics Operating Safely and Efficiently Across Multiple Domains; Chinese Advances in Stealth UAV Penetration Path Planning in Combat Environment; UAS, the Fourth Amendment and Privacy; UV & Disinformation / Misinformation Channels; Chinese UAS Proliferation along New Silk Road Sea / Land Routes; Automaton, AI, Law, Ethics, Crossing the Machine – Human Barrier and Maritime Cybersecurity.Unmanned Vehicle Systems are an integral part of the US national critical infrastructure The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. Unmanned Vehicle (UV) Systems & Operations On Air, Sea, Land discusses state-of-the-art technology / issues facing U.S. UV system researchers / designers / manufacturers / testers. We trust our newest look at Unmanned Vehicles in Air, Sea, and Land will enrich our students and readers understanding of the purview of this wonderful technology we call UV.https://newprairiepress.org/ebooks/1035/thumbnail.jp

    Counter Unmanned Aircraft Systems Technologies and Operations

    Get PDF
    As the quarter-century mark in the 21st Century nears, new aviation-related equipment has come to the forefront, both to help us and to haunt us. (Coutu, 2020) This is particularly the case with unmanned aerial vehicles (UAVs). These vehicles have grown in popularity and accessible to everyone. Of different shapes and sizes, they are widely available for purchase at relatively low prices. They have moved from the backyard recreation status to important tools for the military, intelligence agencies, and corporate organizations. New practical applications such as military equipment and weaponry are announced on a regular basis – globally. (Coutu, 2020) Every country seems to be announcing steps forward in this bludgeoning field. In our successful 2nd edition of Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets (Nichols, et al., 2019), the authors addressed three factors influencing UAS phenomena. First, unmanned aircraft technology has seen an economic explosion in production, sales, testing, specialized designs, and friendly / hostile usages of deployed UAS / UAVs / Drones. There is a huge global growing market and entrepreneurs know it. Second, hostile use of UAS is on the forefront of DoD defense and offensive planners. They are especially concerned with SWARM behavior. Movies like “Angel has Fallen,” where drones in a SWARM use facial recognition technology to kill USSS agents protecting POTUS, have built the lore of UAS and brought the problem forefront to DHS. Third, UAS technology was exploding. UAS and Counter- UAS developments in navigation, weapons, surveillance, data transfer, fuel cells, stealth, weight distribution, tactics, GPS / GNSS elements, SCADA protections, privacy invasions, terrorist uses, specialized software, and security protocols has exploded. (Nichols, et al., 2019) Our team has followed / tracked joint ventures between military and corporate entities and specialized labs to build UAS countermeasures. As authors, we felt compelled to address at least the edge of some of the new C-UAS developments. It was clear that we would be lucky if we could cover a few of – the more interesting and priority technology updates – all in the UNCLASSIFIED and OPEN sphere. Counter Unmanned Aircraft Systems: Technologies and Operations is the companion textbook to our 2nd edition. The civilian market is interesting and entrepreneurial, but the military and intelligence markets are of concern because the US does NOT lead the pack in C-UAS technologies. China does. China continues to execute its UAS proliferation along the New Silk Road Sea / Land routes (NSRL). It has maintained a 7% growth in military spending each year to support its buildup. (Nichols, et al., 2019) [Chapter 21]. They continue to innovate and have recently improved a solution for UAS flight endurance issues with the development of advanced hydrogen fuel cell. (Nichols, et al., 2019) Reed and Trubetskoy presented a terrifying map of countries in the Middle East with armed drones and their manufacturing origin. Guess who? China. (A.B. Tabriski & Justin, 2018, December) Our C-UAS textbook has as its primary mission to educate and train resources who will enter the UAS / C-UAS field and trust it will act as a call to arms for military and DHS planners.https://newprairiepress.org/ebooks/1031/thumbnail.jp

    Abstracts on Radio Direction Finding (1899 - 1995)

    Get PDF
    The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography). Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM. The contents of these files are: 1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format]; 2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format]; 3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion

    Avoin alustakehitys IEEE 802.15.4 -standardin mukaisessa langattomassa automaatiossa

    Get PDF
    This doctoral dissertation focuses on open source platform development in wireless automation under IEEE 802.15.4 standard. Research method is empirical. A platform based approach, which targets to the design of a generic open source sensor platform, was selected as a design method. The design targets were further focused by interviewing the experts from the academia and industry. Generic and modular sensor platform, the UWASA Node, was developed as an outcome of this process. Based on the implementation results, a wireless sensor and actuator network based on the UWASA Node was a feasible solution for many types of wireless automation applications. It was also possible to interface it with the other parts of the system. The targeted level of sensor platform genericity was achieved. However, it was also observed that the achieved level of genericity increased the software complexity. The development of commercial sensor platforms, which support IEEE 802.15.4 sensor networking, has narrowed down the role of open source sensor platforms, but they are not disappearing. Commercial software is usually closed and connected to a specified platform, which makes it unsuitable for research and development work. Even though there exits many commercial WSN solutions and the market expectations in this area are high, there is still a lot of work to do before the visions about Internet of Things (IoT) are fulfilled, especially in the context of distributed and locally centralized operations in the network. In terms of control engineering, one of the main research issues is to figure out how the well-known control techniques may be applied in wireless automation where WSN is part of the automation system. Open source platforms offer an important tool in this research and development work.Tämä väitöskirja käsittelee avointa alustakehitystä IEEE 802.15.4 -standardin mukaisessa langattomassa automaatiossa. Tutkimusmenetelmä on empiirinen. Työssä sovelletaan alustaperustaista suunnittelutapaa, joka tähtää yleiskäyttöisen avoimen anturialustan kehittämiseen. Suunnittelun tavoitteita tarkennettiin haastattelemalla alan asiantuntijoita teollisuudesta ja yliopistomaailmasta. Tuloksena suunniteltiin ja toteutettiin anturialusta, the UWASA Node. Implementointituloksista voidaan vetää johtopäätös, että anturialustan tavoiteltu yleiskäyttöisyystaso saavutettiin. Toisaalta saavutettu yleiskäyttöisyystaso lisäsi alustan ohjelmistoarkkitehtuurin monimutkaisuutta. Kaupallisten IEEE 802.15.4 -standardia tukevien anturialustojen tulo markkinoille vähentää avointen anturialustojen käyttöä, mutta ne eivät ole katoamassa. Kaupalliset ohjelmistot ovat tyypillisesti suljettuja ja sidoksissa tiettyyn alustaan, mikä tekee niistä sopimattomia tutkimus- ja tuotekehityskäyttöön. Vaikka nykyään on saatavilla useita kaupallisia langattomia anturi- ja toimilaiteverkkoja, vaaditaan vielä paljon työtä ennen kun kaikki esineiden Internetiin (Internet of Things) liittyvät visiot voidaan toteuttaa. Tämä koskee erityisesti langattomassa anturi- ja toimilaiteverkossa hajautetusti tai paikallisesti toteutettavia toimintoja. Säätötekniikan näkökulmasta keskeinen kysymys on, miten tunnettuja säätömenetelmiä tulee soveltaa langattomassa automaatiossa, jossa langaton anturi- ja toimilaiteverkko on osa automaatiojärjestelmää. Avoimet anturialustat ovat tärkeä työkalu sen selvittämisessä.fi=vertaisarvioitu|en=peerReviewed

    Summary of Research 1994

    Get PDF
    The views expressed in this report are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government.This report contains 359 summaries of research projects which were carried out under funding of the Naval Postgraduate School Research Program. A list of recent publications is also included which consists of conference presentations and publications, books, contributions to books, published journal papers, and technical reports. The research was conducted in the areas of Aeronautics and Astronautics, Computer Science, Electrical and Computer Engineering, Mathematics, Mechanical Engineering, Meteorology, National Security Affairs, Oceanography, Operations Research, Physics, and Systems Management. This also includes research by the Command, Control and Communications (C3) Academic Group, Electronic Warfare Academic Group, Space Systems Academic Group, and the Undersea Warfare Academic Group

    Reports to the President

    Get PDF
    A compilation of annual reports for the 1999-2000 academic year, including a report from the President of the Massachusetts Institute of Technology, as well as reports from the academic and administrative units of the Institute. The reports outline the year's goals, accomplishments, honors and awards, and future plans
    corecore