CN114172691A - Anti-tracking interference system based on decoy strategy - Google Patents

Anti-tracking interference system based on decoy strategy Download PDF

Info

Publication number
CN114172691A
CN114172691A CN202111333446.2A CN202111333446A CN114172691A CN 114172691 A CN114172691 A CN 114172691A CN 202111333446 A CN202111333446 A CN 202111333446A CN 114172691 A CN114172691 A CN 114172691A
Authority
CN
China
Prior art keywords
tracking
decoy
communication
information
interference
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111333446.2A
Other languages
Chinese (zh)
Inventor
刘一甲
王伟
黄赞奇
王可为
苏悦悦
黄叶婷
贾录良
戚楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Aeronautics and Astronautics
Original Assignee
Nanjing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Aeronautics and Astronautics filed Critical Nanjing University of Aeronautics and Astronautics
Priority to CN202111333446.2A priority Critical patent/CN114172691A/en
Publication of CN114172691A publication Critical patent/CN114172691A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1491Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/707Spread spectrum techniques using direct sequence modulation
    • H04B1/7097Interference-related aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • H04B1/713Spread spectrum techniques using frequency hopping
    • H04B1/715Interference-related aspects

Abstract

The invention discloses an anti-tracking interference system based on a decoy strategy, which comprises: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted. The invention can utilize the decoy resource block to actively release related resources, attract the tracking interference in the environment and ensure the communication of the real user.

Description

Anti-tracking interference system based on decoy strategy
Technical Field
The invention relates to the technical field of communication anti-interference, in particular to an anti-tracking interference system based on a decoy strategy.
Background
The problem of interference resistance in communication has been studied for a long time, and the conventional interference resistance technology mainly includes an interference avoidance technology and an interference elimination technology. The interference avoidance technology is to deal with interference attack such as frequency hopping of a frequency domain, time hopping of a time domain and the like by using an avoidance mode. The traditional frequency domain anti-interference methods such as frequency hopping, spread spectrum, passive sensing access spectrum and the like have a plurality of limitations, and the requirements for resisting novel interference technologies cannot be met. Tracking interference is one of the most effective interference attacks, attacks a target signal according to a sensing result of a frequency spectrum, and has the characteristics of reaction and irregular attack behavior. The existing anti-tracking interference technology is gradually mature, mainly comprises the steps of improving the frequency hopping rate, utilizing the reaction time of an interference machine, eliminating interference by using an MIMO technology, designing an anti-interference protocol of an MAC layer and the like to avoid the interference, but the existing anti-tracking interference technology is not realized by a platform based on deception.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an anti-tracking interference system based on a spoofing strategy, which can actively release related resources by using spoofing resource blocks, attract tracking interference in the environment and ensure the communication of real users.
In order to solve the above technical problem, the present invention provides an anti-tracking interference system based on a spoofing strategy, comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
Preferably, the tracking jammer selects the USRP device E as a hardware transmitting platform, and the model of the used hardware device is USRP-2920.
Preferably, the spoofed resource block includes a USRP device D with an antenna gain set to 25dB to ensure that the transmit power is greater than that of the actual communication user.
Preferably, pictures are selected among communication user pairs as service information to be transmitted, picture pixel points are converted into bit streams by a transmitting terminal, bit data are transmitted through a radio frequency antenna A of the USRP equipment after being packetized and framed, QPSK is selected as a modulation mode, the antenna gain is 10dB, a frequency band of 1.7 GHz-1.710 GHz is selected as a data communication link, and the communication bandwidth is 2 MHz; and the USRP equipment B at the receiving end recovers and displays the picture information after receiving the data packet, and meanwhile, in order to realize the frequency point hopping function, the sensing USRP equipment C at the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving and transmitting parties is realized.
The invention has the beneficial effects that: the invention utilizes the decoy strategy to attract the tracking interference, thereby not only ensuring the communication quality of the user, but also avoiding a complex anti-interference method, utilizes the decoy resource block to actively release related resources, attracts the tracking interference in the environment, ensures the communication of the real user, and provides a new research idea for resisting the tracking interference.
Drawings
Fig. 1 is a schematic diagram illustrating the effect of tracking interference according to the present invention.
Fig. 2 is a schematic structural diagram of a hardware platform system constructed by the invention.
FIG. 3 is a schematic diagram illustrating the spoofing effect of the present invention at the current moment.
Fig. 4 is a graph comparing throughput curves of the present invention for the added decoy users and the un-decoy users.
Detailed Description
A spoof strategy based anti-jamming system comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
Two communication systems and a tracking jammer are constructed, USRP equipment is selected as a hardware transceiving platform, and the used hardware equipment is USRP-2920.
The tracking jammer detects the signal power value in the frequency band, tracks the signal with the strongest energy in real time, and releases the narrow-band strong interference at the corresponding frequency point. In this case, the throughput and information reception of the user are as shown in fig. 1, and it can be seen that the tracking interference can greatly hinder the normal communication of the user.
The picture is selected as the service information to be transmitted between the real communication user pairs, the picture pixel points are converted into bit streams by the transmitting terminal, and the bit data are transmitted through the USRP radio frequency antenna after being packetized and framed. QPSK is selected as the modulation mode, the antenna gain is 10dB, the frequency band of 1.7 GHz-1.710 GHz is selected as the data communication link, and the communication bandwidth is 2 MHz. And the USRP of the receiving end recovers and displays the picture information after receiving the data packet, and simultaneously, the sensing USRP of the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, and the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving end and the receiving end is realized. The hardware platform is built as shown in fig. 2.
The platform construction of the luring user is similar to that of the communication user, except that the antenna gain of the USRP equipment is set to be 25dB, and the transmitting power is ensured to be larger than that of the real communication user. Fig. 3 shows the spoofing effect at the current moment, and it can be seen that after the spoofing resource is released, the frequency band where the spoofing user is located is tracked and sniffed by tracking interference, and the frequency band where the protected user is located appears without interference, so that normal communication can be achieved. The throughput of the communication system after the spoofed user is added versus the throughput when the spoofed user is not added is shown in fig. 4.
The modules of the present invention may be deployed on different hardware platforms and are not limited to any specific combination of hardware and software.

Claims (4)

1. An anti-chase jamming system based on a spoofing strategy, comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
2. The decoy-policy-based anti-tracking jamming system of claim 1, wherein the tracking jammer selects USRP device E as a hardware transmitting platform, and uses a hardware device model of USRP-2920.
3. The spoof strategy based anti-interference-with-tracking system of claim 1 wherein the spoofed resource block includes a USRP device D with an antenna gain set to 25dB to ensure a transmit power greater than that of the actual communicating user.
4. The anti-tracking interference system based on the spoofing strategy as claimed in claim 1, wherein a picture is selected between a communication user pair as service information to be transmitted, a transmitting end converts picture pixel points into a bit stream, the bit data is transmitted through a radio frequency antenna A of the USRP device after being packetized and framed, a QPSK is selected in a modulation mode, the antenna gain is 10dB, a frequency band of 1.7GHz to 1.710GHz is selected for a data communication link, and the communication bandwidth is 2 MHz; and the USRP equipment B at the receiving end recovers and displays the picture information after receiving the data packet, and meanwhile, in order to realize the frequency point hopping function, the sensing USRP equipment C at the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving and transmitting parties is realized.
CN202111333446.2A 2021-11-11 2021-11-11 Anti-tracking interference system based on decoy strategy Pending CN114172691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111333446.2A CN114172691A (en) 2021-11-11 2021-11-11 Anti-tracking interference system based on decoy strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111333446.2A CN114172691A (en) 2021-11-11 2021-11-11 Anti-tracking interference system based on decoy strategy

Publications (1)

Publication Number Publication Date
CN114172691A true CN114172691A (en) 2022-03-11

Family

ID=80478820

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111333446.2A Pending CN114172691A (en) 2021-11-11 2021-11-11 Anti-tracking interference system based on decoy strategy

Country Status (1)

Country Link
CN (1) CN114172691A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7020701B1 (en) * 1999-10-06 2006-03-28 Sensoria Corporation Method for collecting and processing data using internetworked wireless integrated network sensors (WINS)
US20160344510A1 (en) * 2013-05-29 2016-11-24 Drexel University Real-time and protocol-aware reactive jamming in wireless networks
CN106226746A (en) * 2016-07-11 2016-12-14 中国人民解放军国防科学技术大学 Based on phase-modulation surface misquote interference method
US20160370227A1 (en) * 2014-12-30 2016-12-22 Huazhong University Of Science And Technology Moving platform borne infrared image-spectrum associated detection system and method
CN108833049A (en) * 2018-06-12 2018-11-16 北京邮电大学 Deception formula anti-interference method and device based on cognition in a kind of unmanned plane network
CN110351795A (en) * 2018-04-08 2019-10-18 北京松果电子有限公司 Frequency handover method, apparatus, storage medium and wireless device
CN110380802A (en) * 2019-06-14 2019-10-25 中国人民解放军陆军工程大学 Single user dynamic spectrum jamproof system and method based on Software Radio platform
CN110602712A (en) * 2019-08-13 2019-12-20 北京大学 Frequency point switching anti-interference wireless local area network communication method and device
CN110635862A (en) * 2019-09-25 2019-12-31 中国人民解放军陆军工程大学 Unmanned aerial vehicle counter-braking system
CN111726192A (en) * 2020-06-12 2020-09-29 南京航空航天大学 Communication countermeasure medium frequency decision optimization method based on log linear algorithm
CN112752311A (en) * 2020-12-18 2021-05-04 南京航空航天大学 Intelligent dynamic spectrum anti-interference system and method combined with network link level
CN113395129A (en) * 2021-05-19 2021-09-14 桂林理工大学 Decoy-assisted hidden anti-interference method, device and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7020701B1 (en) * 1999-10-06 2006-03-28 Sensoria Corporation Method for collecting and processing data using internetworked wireless integrated network sensors (WINS)
US20160344510A1 (en) * 2013-05-29 2016-11-24 Drexel University Real-time and protocol-aware reactive jamming in wireless networks
US20160370227A1 (en) * 2014-12-30 2016-12-22 Huazhong University Of Science And Technology Moving platform borne infrared image-spectrum associated detection system and method
CN106226746A (en) * 2016-07-11 2016-12-14 中国人民解放军国防科学技术大学 Based on phase-modulation surface misquote interference method
CN110351795A (en) * 2018-04-08 2019-10-18 北京松果电子有限公司 Frequency handover method, apparatus, storage medium and wireless device
CN108833049A (en) * 2018-06-12 2018-11-16 北京邮电大学 Deception formula anti-interference method and device based on cognition in a kind of unmanned plane network
CN110380802A (en) * 2019-06-14 2019-10-25 中国人民解放军陆军工程大学 Single user dynamic spectrum jamproof system and method based on Software Radio platform
CN110602712A (en) * 2019-08-13 2019-12-20 北京大学 Frequency point switching anti-interference wireless local area network communication method and device
CN110635862A (en) * 2019-09-25 2019-12-31 中国人民解放军陆军工程大学 Unmanned aerial vehicle counter-braking system
CN111726192A (en) * 2020-06-12 2020-09-29 南京航空航天大学 Communication countermeasure medium frequency decision optimization method based on log linear algorithm
CN112752311A (en) * 2020-12-18 2021-05-04 南京航空航天大学 Intelligent dynamic spectrum anti-interference system and method combined with network link level
CN113395129A (en) * 2021-05-19 2021-09-14 桂林理工大学 Decoy-assisted hidden anti-interference method, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SUMAN BHUNIA,EDWARD MILES,SHAMIK SENGUPTA: "CR-Honeynet:A cognitive radio learning and decoy-based sustenance mechanism to avoid intelligent jammer", 《IEEE》 *
张晓博,王海,冯智斌,李艾静: "基于主动诱导机制的中继通信智能抗干扰方法", 《南京邮电大学学报》 *

Similar Documents

Publication Publication Date Title
Jian et al. Coexistence of Wi-Fi and LAA-LTE: Experimental evaluation, analysis and insights
US7933255B2 (en) Multi-antenna wireless data processing system
Pelechrinis et al. On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks
Stхhlberg Radio jamming attacks against two popular mobile networks
Sliti et al. Jamming attack detection in optical UAV networks
Pelechrinis et al. Gaming the jammer: Is frequency hopping effective?
Girke et al. Towards resilient 5G: Lessons learned from experimental evaluations of LTE uplink jamming
Martinez et al. On the performance evaluation of LoRaWAN under Jamming
CN111988783A (en) Safe transmission method and system for uplink non-orthogonal multiple access
US20050075070A1 (en) Detecting wireless interlopers
US8488574B2 (en) Wireless network system and association control method thereof
Na et al. Hotspot traffic statistics and throughput models for several applications
Sum et al. On communication and interference range of IEEE 802.15. 4g smart utility networks
CN114172691A (en) Anti-tracking interference system based on decoy strategy
Birutis et al. Practical jamming of a commercial 5G radio system at 3.6 GHz
CN108966272B (en) Method for identifying wireless network communication relation based on accumulated power information
Parkouk et al. Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer
Britton et al. Performance analysis of the BATMAN wireless ad-hoc network routing protocol with mobility and directional antennas
Al-Azzawi et al. Wi-Fi 6 performance in multi modulation scheme with MATLAB Simulink
Lee et al. Simulator for tactical data link system with anti-jamming capability
Johnson Performance envelope of broadband HF data waveforms
Shukla et al. Secrecy outage analysis of full duplex cellular multiuser two-way AF relay networks
Liu et al. CTJammer: A cross-technology reactive jammer towards unlicensed LTE
Orakcal et al. Jamming-resistant rate control in Wi-Fi networks
Sousa et al. Uncoordinated frequency hopping for secrecy with broadband jammers and eavesdroppers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20220311

RJ01 Rejection of invention patent application after publication