Vulnerability of wireless point-to-point systems to interception
Lim, Wee Pin Melvin
Jenn, David C.
MetadataShow full item record
Wireless systems have always been susceptible to interception in both urban outdoor and indoor environments. In point-to-point communication links, the placement of base station antennas is usually determined by an experimental or analytical assessment of the propagation path. Since point-to-point links are typically used to network widely separated areas, antennas used in such situations are likely to be directional, but may still be susceptible to interception by covert entities. In this thesis research, issues pertaining to vulnerability will be identified and preventive measures will be suggested. The generation of received signal contours as a function of location and frequency for different propagation models will also be investigated. This thesis thus examines the vulnerabilities of wireless point-to-point communication to interception by propagation simulations using computational electromagnetic codes available in the Naval Postgraduate ECE Department's Microwave and Antenna Laboratory. The software was used to examine the vulnerability of these wireless systems and identify simple measures that can be taken to increase the system's security.
RightsCopyright is reserved by the copyright owner.
Showing items related by title, author, creator and subject.
Jenn, David C.; Pin, Lim Wee; Sumagaysay, Paul P. (2004);This paper examines the vulnerability of wireless systems to interception, and provides some simple steps that can be taken to improve security. A commercially available computational electromagnetics software package ...
Goodwin, Michael S. (Monterey California. Naval Postgraduate School, 2005-09);"The proliferation of wireless computer equipment and Local Area Networks (LANs) create an increasingly common and growing threat to Marine Corps Network infrastructure and communication security (COMSEC). This threat ...
Kirykos, Georgios (Monterey, California. Naval Postgraduate School, 2006-12);Network security is vital in wireless networks that are widely used today. We desire wireless networks that maintain a high degree of confidentiality, integrity, and availability. Wireless sensor networks pose unique ...