CN114172691A - Anti-tracking interference system based on decoy strategy - Google Patents
Anti-tracking interference system based on decoy strategy Download PDFInfo
- Publication number
- CN114172691A CN114172691A CN202111333446.2A CN202111333446A CN114172691A CN 114172691 A CN114172691 A CN 114172691A CN 202111333446 A CN202111333446 A CN 202111333446A CN 114172691 A CN114172691 A CN 114172691A
- Authority
- CN
- China
- Prior art keywords
- tracking
- decoy
- communication
- information
- interference
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004891 communication Methods 0.000 claims abstract description 38
- 238000001228 spectrum Methods 0.000 claims abstract description 10
- 238000000034 method Methods 0.000 claims abstract description 6
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000001788 irregular Effects 0.000 description 1
- 230000035484 reaction time Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/707—Spread spectrum techniques using direct sequence modulation
- H04B1/7097—Interference-related aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
- H04B1/713—Spread spectrum techniques using frequency hopping
- H04B1/715—Interference-related aspects
Abstract
The invention discloses an anti-tracking interference system based on a decoy strategy, which comprises: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted. The invention can utilize the decoy resource block to actively release related resources, attract the tracking interference in the environment and ensure the communication of the real user.
Description
Technical Field
The invention relates to the technical field of communication anti-interference, in particular to an anti-tracking interference system based on a decoy strategy.
Background
The problem of interference resistance in communication has been studied for a long time, and the conventional interference resistance technology mainly includes an interference avoidance technology and an interference elimination technology. The interference avoidance technology is to deal with interference attack such as frequency hopping of a frequency domain, time hopping of a time domain and the like by using an avoidance mode. The traditional frequency domain anti-interference methods such as frequency hopping, spread spectrum, passive sensing access spectrum and the like have a plurality of limitations, and the requirements for resisting novel interference technologies cannot be met. Tracking interference is one of the most effective interference attacks, attacks a target signal according to a sensing result of a frequency spectrum, and has the characteristics of reaction and irregular attack behavior. The existing anti-tracking interference technology is gradually mature, mainly comprises the steps of improving the frequency hopping rate, utilizing the reaction time of an interference machine, eliminating interference by using an MIMO technology, designing an anti-interference protocol of an MAC layer and the like to avoid the interference, but the existing anti-tracking interference technology is not realized by a platform based on deception.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an anti-tracking interference system based on a spoofing strategy, which can actively release related resources by using spoofing resource blocks, attract tracking interference in the environment and ensure the communication of real users.
In order to solve the above technical problem, the present invention provides an anti-tracking interference system based on a spoofing strategy, comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
Preferably, the tracking jammer selects the USRP device E as a hardware transmitting platform, and the model of the used hardware device is USRP-2920.
Preferably, the spoofed resource block includes a USRP device D with an antenna gain set to 25dB to ensure that the transmit power is greater than that of the actual communication user.
Preferably, pictures are selected among communication user pairs as service information to be transmitted, picture pixel points are converted into bit streams by a transmitting terminal, bit data are transmitted through a radio frequency antenna A of the USRP equipment after being packetized and framed, QPSK is selected as a modulation mode, the antenna gain is 10dB, a frequency band of 1.7 GHz-1.710 GHz is selected as a data communication link, and the communication bandwidth is 2 MHz; and the USRP equipment B at the receiving end recovers and displays the picture information after receiving the data packet, and meanwhile, in order to realize the frequency point hopping function, the sensing USRP equipment C at the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving and transmitting parties is realized.
The invention has the beneficial effects that: the invention utilizes the decoy strategy to attract the tracking interference, thereby not only ensuring the communication quality of the user, but also avoiding a complex anti-interference method, utilizes the decoy resource block to actively release related resources, attracts the tracking interference in the environment, ensures the communication of the real user, and provides a new research idea for resisting the tracking interference.
Drawings
Fig. 1 is a schematic diagram illustrating the effect of tracking interference according to the present invention.
Fig. 2 is a schematic structural diagram of a hardware platform system constructed by the invention.
FIG. 3 is a schematic diagram illustrating the spoofing effect of the present invention at the current moment.
Fig. 4 is a graph comparing throughput curves of the present invention for the added decoy users and the un-decoy users.
Detailed Description
A spoof strategy based anti-jamming system comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
Two communication systems and a tracking jammer are constructed, USRP equipment is selected as a hardware transceiving platform, and the used hardware equipment is USRP-2920.
The tracking jammer detects the signal power value in the frequency band, tracks the signal with the strongest energy in real time, and releases the narrow-band strong interference at the corresponding frequency point. In this case, the throughput and information reception of the user are as shown in fig. 1, and it can be seen that the tracking interference can greatly hinder the normal communication of the user.
The picture is selected as the service information to be transmitted between the real communication user pairs, the picture pixel points are converted into bit streams by the transmitting terminal, and the bit data are transmitted through the USRP radio frequency antenna after being packetized and framed. QPSK is selected as the modulation mode, the antenna gain is 10dB, the frequency band of 1.7 GHz-1.710 GHz is selected as the data communication link, and the communication bandwidth is 2 MHz. And the USRP of the receiving end recovers and displays the picture information after receiving the data packet, and simultaneously, the sensing USRP of the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, and the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving end and the receiving end is realized. The hardware platform is built as shown in fig. 2.
The platform construction of the luring user is similar to that of the communication user, except that the antenna gain of the USRP equipment is set to be 25dB, and the transmitting power is ensured to be larger than that of the real communication user. Fig. 3 shows the spoofing effect at the current moment, and it can be seen that after the spoofing resource is released, the frequency band where the spoofing user is located is tracked and sniffed by tracking interference, and the frequency band where the protected user is located appears without interference, so that normal communication can be achieved. The throughput of the communication system after the spoofed user is added versus the throughput when the spoofed user is not added is shown in fig. 4.
The modules of the present invention may be deployed on different hardware platforms and are not limited to any specific combination of hardware and software.
Claims (4)
1. An anti-chase jamming system based on a spoofing strategy, comprising: tracking the jammers, the decoy resource blocks and the communication user pairs; the tracking jammer monitors the frequency spectrum environment in real time, analyzes and detects the signal power value in the frequency band, and interferes the frequency point with the strongest signal energy value; the decoy resource block consists of a USRP, the transmitting power of the decoy resource block is far greater than that of a communication user, and the decoy resource block can be switched among different frequency bands to attract tracking interference; the communication user comprises a transmitting end and a receiving end node, and is used for undertaking the information transceiving task, the transmitting end processes to-be-transmitted information, service information is subpackaged to a data packet with a specific frame format and is transmitted to a receiver, the receiving end recovers the information, the packet loss rate can be calculated, the communication quality is analyzed, and the user throughput is maintained at a high level due to the fact that tracking interference is attracted.
2. The decoy-policy-based anti-tracking jamming system of claim 1, wherein the tracking jammer selects USRP device E as a hardware transmitting platform, and uses a hardware device model of USRP-2920.
3. The spoof strategy based anti-interference-with-tracking system of claim 1 wherein the spoofed resource block includes a USRP device D with an antenna gain set to 25dB to ensure a transmit power greater than that of the actual communicating user.
4. The anti-tracking interference system based on the spoofing strategy as claimed in claim 1, wherein a picture is selected between a communication user pair as service information to be transmitted, a transmitting end converts picture pixel points into a bit stream, the bit data is transmitted through a radio frequency antenna A of the USRP device after being packetized and framed, a QPSK is selected in a modulation mode, the antenna gain is 10dB, a frequency band of 1.7GHz to 1.710GHz is selected for a data communication link, and the communication bandwidth is 2 MHz; and the USRP equipment B at the receiving end recovers and displays the picture information after receiving the data packet, and meanwhile, in order to realize the frequency point hopping function, the sensing USRP equipment C at the receiving end collects frequency spectrum environment data and selects a frequency point with better channel quality, the frequency point information is put into an ACK data packet and is sent to the receiving end through an ACK reverse control link, so that the frequency point access coordination of the receiving and transmitting parties is realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111333446.2A CN114172691A (en) | 2021-11-11 | 2021-11-11 | Anti-tracking interference system based on decoy strategy |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111333446.2A CN114172691A (en) | 2021-11-11 | 2021-11-11 | Anti-tracking interference system based on decoy strategy |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114172691A true CN114172691A (en) | 2022-03-11 |
Family
ID=80478820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111333446.2A Pending CN114172691A (en) | 2021-11-11 | 2021-11-11 | Anti-tracking interference system based on decoy strategy |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114172691A (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7020701B1 (en) * | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
US20160344510A1 (en) * | 2013-05-29 | 2016-11-24 | Drexel University | Real-time and protocol-aware reactive jamming in wireless networks |
CN106226746A (en) * | 2016-07-11 | 2016-12-14 | 中国人民解放军国防科学技术大学 | Based on phase-modulation surface misquote interference method |
US20160370227A1 (en) * | 2014-12-30 | 2016-12-22 | Huazhong University Of Science And Technology | Moving platform borne infrared image-spectrum associated detection system and method |
CN108833049A (en) * | 2018-06-12 | 2018-11-16 | 北京邮电大学 | Deception formula anti-interference method and device based on cognition in a kind of unmanned plane network |
CN110351795A (en) * | 2018-04-08 | 2019-10-18 | 北京松果电子有限公司 | Frequency handover method, apparatus, storage medium and wireless device |
CN110380802A (en) * | 2019-06-14 | 2019-10-25 | 中国人民解放军陆军工程大学 | Single user dynamic spectrum jamproof system and method based on Software Radio platform |
CN110602712A (en) * | 2019-08-13 | 2019-12-20 | 北京大学 | Frequency point switching anti-interference wireless local area network communication method and device |
CN110635862A (en) * | 2019-09-25 | 2019-12-31 | 中国人民解放军陆军工程大学 | Unmanned aerial vehicle counter-braking system |
CN111726192A (en) * | 2020-06-12 | 2020-09-29 | 南京航空航天大学 | Communication countermeasure medium frequency decision optimization method based on log linear algorithm |
CN112752311A (en) * | 2020-12-18 | 2021-05-04 | 南京航空航天大学 | Intelligent dynamic spectrum anti-interference system and method combined with network link level |
CN113395129A (en) * | 2021-05-19 | 2021-09-14 | 桂林理工大学 | Decoy-assisted hidden anti-interference method, device and storage medium |
-
2021
- 2021-11-11 CN CN202111333446.2A patent/CN114172691A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7020701B1 (en) * | 1999-10-06 | 2006-03-28 | Sensoria Corporation | Method for collecting and processing data using internetworked wireless integrated network sensors (WINS) |
US20160344510A1 (en) * | 2013-05-29 | 2016-11-24 | Drexel University | Real-time and protocol-aware reactive jamming in wireless networks |
US20160370227A1 (en) * | 2014-12-30 | 2016-12-22 | Huazhong University Of Science And Technology | Moving platform borne infrared image-spectrum associated detection system and method |
CN106226746A (en) * | 2016-07-11 | 2016-12-14 | 中国人民解放军国防科学技术大学 | Based on phase-modulation surface misquote interference method |
CN110351795A (en) * | 2018-04-08 | 2019-10-18 | 北京松果电子有限公司 | Frequency handover method, apparatus, storage medium and wireless device |
CN108833049A (en) * | 2018-06-12 | 2018-11-16 | 北京邮电大学 | Deception formula anti-interference method and device based on cognition in a kind of unmanned plane network |
CN110380802A (en) * | 2019-06-14 | 2019-10-25 | 中国人民解放军陆军工程大学 | Single user dynamic spectrum jamproof system and method based on Software Radio platform |
CN110602712A (en) * | 2019-08-13 | 2019-12-20 | 北京大学 | Frequency point switching anti-interference wireless local area network communication method and device |
CN110635862A (en) * | 2019-09-25 | 2019-12-31 | 中国人民解放军陆军工程大学 | Unmanned aerial vehicle counter-braking system |
CN111726192A (en) * | 2020-06-12 | 2020-09-29 | 南京航空航天大学 | Communication countermeasure medium frequency decision optimization method based on log linear algorithm |
CN112752311A (en) * | 2020-12-18 | 2021-05-04 | 南京航空航天大学 | Intelligent dynamic spectrum anti-interference system and method combined with network link level |
CN113395129A (en) * | 2021-05-19 | 2021-09-14 | 桂林理工大学 | Decoy-assisted hidden anti-interference method, device and storage medium |
Non-Patent Citations (2)
Title |
---|
SUMAN BHUNIA,EDWARD MILES,SHAMIK SENGUPTA: "CR-Honeynet:A cognitive radio learning and decoy-based sustenance mechanism to avoid intelligent jammer", 《IEEE》 * |
张晓博,王海,冯智斌,李艾静: "基于主动诱导机制的中继通信智能抗干扰方法", 《南京邮电大学学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jian et al. | Coexistence of Wi-Fi and LAA-LTE: Experimental evaluation, analysis and insights | |
US7933255B2 (en) | Multi-antenna wireless data processing system | |
Pelechrinis et al. | On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks | |
Stхhlberg | Radio jamming attacks against two popular mobile networks | |
Sliti et al. | Jamming attack detection in optical UAV networks | |
Pelechrinis et al. | Gaming the jammer: Is frequency hopping effective? | |
Girke et al. | Towards resilient 5G: Lessons learned from experimental evaluations of LTE uplink jamming | |
Martinez et al. | On the performance evaluation of LoRaWAN under Jamming | |
CN111988783A (en) | Safe transmission method and system for uplink non-orthogonal multiple access | |
US20050075070A1 (en) | Detecting wireless interlopers | |
US8488574B2 (en) | Wireless network system and association control method thereof | |
Na et al. | Hotspot traffic statistics and throughput models for several applications | |
Sum et al. | On communication and interference range of IEEE 802.15. 4g smart utility networks | |
CN114172691A (en) | Anti-tracking interference system based on decoy strategy | |
Birutis et al. | Practical jamming of a commercial 5G radio system at 3.6 GHz | |
CN108966272B (en) | Method for identifying wireless network communication relation based on accumulated power information | |
Parkouk et al. | Secrecy performance analysis of amplify-and-forward relay cooperative networks with simultaneous wireless information and power transfer | |
Britton et al. | Performance analysis of the BATMAN wireless ad-hoc network routing protocol with mobility and directional antennas | |
Al-Azzawi et al. | Wi-Fi 6 performance in multi modulation scheme with MATLAB Simulink | |
Lee et al. | Simulator for tactical data link system with anti-jamming capability | |
Johnson | Performance envelope of broadband HF data waveforms | |
Shukla et al. | Secrecy outage analysis of full duplex cellular multiuser two-way AF relay networks | |
Liu et al. | CTJammer: A cross-technology reactive jammer towards unlicensed LTE | |
Orakcal et al. | Jamming-resistant rate control in Wi-Fi networks | |
Sousa et al. | Uncoordinated frequency hopping for secrecy with broadband jammers and eavesdroppers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220311 |
|
RJ01 | Rejection of invention patent application after publication |