55 research outputs found

    COMB JAMMING AS A STRATEGY FOR RCIED ACTIVATION PREVENTION

    Get PDF
    The main objective of this paper is the analysis of comb jamming as a technique for RCIED activation prevention. Presentation of three strategies for comb signal generation follows after comprehensive survey of various jamming techniques in the introduction. There are two paper original contributions. The first one is quantitative comparison for three signal generation techniques of their emission power in relation to barrage jamming under the condition of equal BER value. The second contribution is determination of exact BER value as a function of emission power in the case of barrage jamming. Until now we have made different analyses and comparisons starting from estimated emission power. The analysis procedure is performed for QPSK modulated RCIED activation signal. Power saving is evident for all three methods of jamming signal generation. It is proved that additional 2.5dB of power saving is achieved by equalization of frequency components level in comb signal. The analysis in this paper shows that comb jamming allows the same effects as barrage jamming, but with lower emission power

    AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED

    Get PDF
    In the article the concept, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a name AEGIS) were presented, both in the hardware and software areas. The device is designed to block the radio communication which allow detonating the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating the jamming signal, that were presented in the paper, aimed at assessing the correctness of the device operation and verification of generated signal parameters. On the basis of the obtained results, the ability to jam the cellular systems as well as other radio devices operating in the frequency band from 400 MHz to 2700 MHz was assessed

    AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED

    Get PDF
    In the article the concept, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a name AEGIS) were presented, both in the hardware and software areas. The device is designed to block the radio communication which allow detonating the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating the jamming signal, that were presented in the paper, aimed at assessing the correctness of the device operation and verification of generated signal parameters. On the basis of the obtained results, the ability to jam the cellular systems as well as other radio devices operating in the frequency band from 400 MHz to 2700 MHz was assessed

    RELIABILITY ANALYSIS OF DIFFERENT RCIED ACTIVATION SIGNAL RESPONSIVE JAMMING TECHNIQUES AND THEIR COMPARISON TO ACTIVE JAMMING

    Get PDF
    In this paper we compared the time required for the successful jamming of remote controlled improvised explosive devices activation using active and responsive jamming methods. As a representative of active jamming method we analyzed jamming signal generation using frequency sweep. For the analysis of the possible activating signal presence based on responsive jamming procedures we first supposed Fast Fourier Transform (FFT) implementation and compared its analysis rate to the rate of sweep jamming. Taking into account the current technology state, it is proved that the time required to achieve the successful jamming relied on FFT analysis may be less than in the case of active sweep jamming. After that we considered pros and cons for energy detector and matched filter detector implementation in responsive jamming. For these two detector types it is shown how to determine the number of analysis blocks to achieve approximately the same number of collected samples as in the case of FFT implementation, starting from the probabilities of false detection and miss of detection

    ANALYSIS OF JAMMING SUCCESSFULNESS AGAINST RCIED ACTIVATION WITH THE EMPHASIS ON SWEEP JAMMING

    Get PDF
    In this paper we first briefly compare the performances of active jamming remote controlled improvised explosive devices activation using wide-band noise and frequency sweep signal. Frequency sweep is the most widely used technique intended for active jamming and we analyze its characteristics: 1) sweep speed, 2) conditions for certainly successful jamming, 3) successful jamming probability if jamming is not certainly successful, and 4) step of frequency change when frequency sweep is applied. The separate paper section is devoted to the successful jamming probability calculation in general. The attention is also paid to jamming probability determination when starting and ending sweep signal frequencies are varied. The initial research has been upgraded and extended. The presented results refer to jamming equipment development in IRITEL, but it is important to add that they are also applicable to the other similar jamming systems realizations

    Successful Sweep Jamming Rate Determination of MPSK Modulated RCIED Activation Message Signals

    Get PDF
    This paper presents the development of the method for accurate successful jamming rate calculation when MPSK modulated RCIED activation message is jammed using sweep signal. Opposite to classical methods of error modelling where it is taken that only one bit in a symbol may be altered, it is supposed in this paper that any number of bits in a symbol is the subject of eventual modification. The derived formulas are achieved for QPSK, 8PSK and 16PSK modulated signals jamming. The results calculated by these formulas are verified and obtained by our originally developed simulation method. The results of calculation and simulation agree very well and the maximum difference between calculated and simulated successful jamming rate for any of three analyzed jamming methods and any level ratio between activation message signal and jamming signal does not overcome 1.1%. It is proved that successful jamming rate tends to maximum value 0.5 when jamming signal power increases and that only 20% lower successful jamming rate value is obtained for less than 7dB higher jamming signal level than it is the level of RCIED activation signal. These results point out that it is not necessary to apply too high emission power to achieve acceptable jamming effect. As a consequence, jammer practical implementation is easier and its dimensions are smaller

    The development of a warhead into an integrated weapon system to provide an advanced battlefield capability

    Get PDF
    This thesis addresses the topic of integration of weapons systems into communication networks to provide an advanced battlefield capability, with particular application to air launched and long range crew served weapon systems which may also be vehicle mounted. It considers the use of 'Military off-the-shelf' seeker, navigation and communication systems coupled with a novel tandem warhead system. This combination of 'low risk' technologies and a novel warhead system is intended to demonstrate a greater flexibility in weapon systems which could be exploited to reduce development risk, integration risk, qualification costs and increase target defeat capability across the wider more current target set. The use of a suitable communication and navigation system enabling integration of such a weapon system into a networked force was also investigated. This thesis is based on one area of research; Multiple Effects Weapons. Research is being undertaken by several nations on Multiple Effects Weapons. The aim of this research is not to provide a one weapon fits all solution, a panacea, the aim is to widen the utility of one system which could be employed in many roles. As yet no warhead system has achieved the types of effects that are being sought, although research and product development – particularly in the United States of America - continues. Therefore the United Kingdom government has sought to understand what technologies would be required to achieve a truly flexible warhead system which would enable defeat of large Main Battle Tanks, heavily armoured Infantry Fighting Vehicles, Soft Skinned Vehicles, infantry and urban structures. To this end numerical modelling, design and a demonstration programme of a MEW warhead system was performed. MEW systems are not only reliant on 'Smart' warhead systems, the application of sensors, fuzing and communication systems are crucial to enable suitable employment of a 'one size fits most' approach. The other important sub-systems which provide the link to the battlefield network are also discussed in this thesis, the inclusion of these well developed low risk technologies make it is possible to bring such systems into service in the near term with increased system flexibility. The integration of such a system relies on the current United States Department of Defense procurement strategy which includes development of the Joint Tactical Radio System radio system which will allow Ad-Hoc networking between platforms, weapons systems and commanders. Airframe and propulsion technologies are not discussed; they are outside of the scope of this thesis. The use of proprietary data from suppliers other than QinetiQ has been avoided as suitable permissions are not in place, this has limited the systems engineering aspects of this thesis to high level block diagrams which provide guidance on integration issues

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    IoT protocols, architectures, and applications

    Get PDF
    The proliferation of embedded systems, wireless technologies, and Internet protocols have made it possible for the Internet-of-things (IoT) to bridge the gap between the physical and the virtual world and thereby enabling monitoring and control of the physical environment by data processing systems. IoT refers to the inter-networking of everyday objects that are equipped with sensing, computing, and communication capabilities. These networks can collaborate to autonomously solve a variety of tasks. Due to the very diverse set of applications and application requirements, there is no single communication technology that is able to provide cost-effective and close to optimal performance in all scenarios. In this chapter, we report on research carried out on a selected number of IoT topics: low-power wide-area networks, in particular, LoRa and narrow-band IoT (NB-IoT); IP version 6 over IEEE 802.15.4 time-slotted channel hopping (6TiSCH); vehicular antenna design, integration, and processing; security aspects for vehicular networks; energy efficiency and harvesting for IoT systems; and software-defined networking/network functions virtualization for (SDN/NFV) IoT
    corecore