INNOVATIVE ELECTROMAGNETIC PROTECTION TECHNIQUES AGAINST ADVANCED JAMMING WAVEFORM THREATS

Download
Author
Feltes, Alexandra
Date
2021-06Advisor
Romero, Ric
Second Reader
Jenn, David C.
Metadata
Show full item recordAbstract
In this thesis, we develop electromagnetic protection (EP) receiver techniques to mitigate the false
alarm probability and detection effects generated by transmit waveform shaped noise jammers (TWS-NJs)
and deceptive coherent jammers (CJs). Unlike traditional wideband NJ (WB-NJ) and narrowband NJ
(NB-NJ) that produce spectral densities almost uniformly distributed across their respective bandwidths, a
TWS-NJ assumes apriori knowledge of a signal spectral shape, thereby utilizing the waveform dominant
bands in generating jammer noise. While noise jammers produce a significant number of false targets, CJs
manipulate and retransmit the received signal to generate a few false targets in the victim receiver. For
illustration in this thesis, we utilize the basic rectangular and Hamming pulses as transmit waveforms to
evaluate the detection performance effects of the TWS-NJ and CJ waveforms. The bandwidths of the
TWS-NJs are parameterized to reflect the effect of practical narrowband constraints. The performance effect
of various jammers, including the TWS eigenjammer, on detection performance is also investigated. To
mitigate the TWS-NJs, we develop an adaptive matched filter and evaluate performance improvement. To
mitigate the CJ, we develop a non-coherent EP matched filter and evaluate false detection rate improvement.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
Mitigating distributed denial of service attacks with Multiprotocol Label Switching--Traffic Engineering (MPLS-TE)
Vordos, Ioannis (Monterey, California. Naval Postgraduate School, 2009-03);A Denial of Service (DoS) occurs when legitimate users are prevented from using a service over a computer network. A Distributed Denial of Service (DDoS) attack is a more serious form of DoS in which an attacker uses the ... -
Automated alerting for black hole routing
Puri, Vinay (Monterey, California. Naval Postgraduate School, 2007-09);Distributed/Denial of Service (D/DoS) attacks are the most common and easy-tolaunch attacks against a computer or network. Once a D/DoS attack is recognized, there are several methods available to mitigate its impact. ... -
Prediction of performance in signal detection
Bulkeley, Peter Wood; Tracey, Michael Thomas (Monterey, California. Naval Postgraduate School, 1973-03);The performance of an individual in a signal-detection task depends on two independent psychological processes. One of these processes is sensory activation, and the other is cognitive decision. In a signaldetection experiment, ...