©2005, The Aerospace Corporation, All Rights Reserved 1 Satellite TT&C Denial, Electronic Counter Measure and Mitigation.

Slides:



Advertisements
Similar presentations
You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
Advertisements

Adders Used to perform addition, subtraction, multiplication, and division (sometimes) Half-adder adds rightmost (least significant) bit Full-adder.
Using Matrices in Real Life
Advanced Piloting Cruise Plot.
Copyright © 2002 Pearson Education, Inc. Slide 1.
© 2008 Pearson Addison Wesley. All rights reserved Chapter Seven Costs.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2003 Chapter 3 Data Transmission.
Chapter 1 The Study of Body Function Image PowerPoint
1 Chapter 3 Digital Communication Fundamentals for Cognitive Radio Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski,
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
1. Introduction.
Simulation and Evaluation of Various Block Assignments Evaluation of multiple carriers deployed in a channel block evaluation criteria section.
Iterative Equalization and Decoding
FIXED SATELLITE SERVICE and UAS (22 September 2010)
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Richmond House, Liverpool (1) 26 th January 2004.
Digital Filter Banks The digital filter bank is set of bandpass filters with either a common input or a summed output An M-band analysis filter bank is.
Charge Pump PLL.
ABC Technology Project
Hash Tables.
Chapter 6 Normal Distributions Understandable Statistics Ninth Edition
نیمسال اوّل افشین همّت یار دانشکده مهندسی کامپیوتر مخابرات سیّار (626-40) ظرفیت انتقال اطلاعات.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
VOORBLAD.
Name Convolutional codes Tomashevich Victor. Name- 2 - Introduction Convolutional codes map information to code bits sequentially by convolving a sequence.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Satellite Link Design.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
© 2012 National Heart Foundation of Australia. Slide 2.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
S Transmission Methods in Telecommunication Systems (5 cr)
1 S Digital Communication Systems Advanced Modulation and Random Access Techniques.
25 seconds left…...
Slippery Slope
Chapter 6 Equations 6.1 Solving Trigonometric Equations 6.2 More on Trigonometric Equations 6.3 Trigonometric Equations Involving Multiples Angles 6.4.
Januar MDMDFSSMDMDFSSS
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Chapter 8 Estimation Understandable Statistics Ninth Edition
Copyright © 2010 Pearson Addison-Wesley. All rights reserved. Chapter 15 2 k Factorial Experiments and Fractions.
PSSA Preparation.
Essential Cell Biology
3 - 1 Copyright McGraw-Hill/Irwin, 2005 Markets Demand Defined Demand Graphed Changes in Demand Supply Defined Supply Graphed Changes in Supply Equilibrium.
Math Review with Matlab:
IE 419/519 Wireless Networks Lecture Notes #6 Spread Spectrum.
1 Introduction to. 2 Contents: DEFINITION OF SPREAD SPECTRUM ( SS ) CHARACTERISTICS OF SPREAD SPECTRUM BASIC PRINCIPLES OF DIRECT SEQUENCE SPREAD SPECTRUM.
教育部網路通訊人才培育先導型計畫 Wireless Communication Technologies 1 Outline Introduction Pseudo-Noise Sequences Direct-sequence Spread Spectrum
Minufiya University Faculty of Electronic Engineering Dep. of Electronic and Communication Eng. 4’th Year Information Theory and Coding Lecture on: Performance.
Subject Name: Digital Communication Subject Code: 10EC61
Advanced Wireless Networks
Advanced Wireless Networks
Telecommunications Engineering Topic 2: Modulation and FDMA
Presentation transcript:

©2005, The Aerospace Corporation, All Rights Reserved 1 Satellite TT&C Denial, Electronic Counter Measure and Mitigation By Don Olsen For Presentation at Security Working Group Of CCSDS April 11-15, 2005 Athens Greece

©2005, The Aerospace Corporation, All Rights Reserved 2 Background Satellite TT&C links are susceptible to electronic counter measures (ECM). –Spoofing –Eavesdropping –Denial/Jamming Satellite TT&C links can be protected against ECM by –Encryption, –Authentication, and –Spread spectrum This presentation will focus on AJ performance with spread spectrum.

©2005, The Aerospace Corporation, All Rights Reserved 3 Waveform Security and Jamming Mitigation Some systems provide anti-jam capability through spread spectrum. –This could include frequency hopping or pseudo-noise (PN) spreading. –The measure of the improvement achieved is called processing gain. –Frequency hopping anti-jam waveforms: –Provide greater processing gain for same complexity than PN, –But has disadvantage of susceptibility to partial band and smart jamming, –Secure TRANSEC can protect against frequency agile, smart, narrow band jamming. –Presentation will restrict discussion to frequency hopping. Power efficient modulation minimizes E b /N o in AWGN as well as jamming.

©2005, The Aerospace Corporation, All Rights Reserved 4 Waveform Security and Jamming Mitigation (Cont.) Coding needs to maximize the required channel BER (P cbe ) so that partial band jamming is a disadvantage. –BER is inversely proportional to E b /N j, for partial band noise jammed (PBNJ) single diversity signals as shown next. –N j is avg. jammer density. –Curve is tangent to the AWGN curve. (p. 11) –The slope is equal to the diversity symbol repetition combining. –Error correction coding must permit operation with the P cbe at or above the tangent point, –For no E b /N j degradation from the E b /N o performance and –Forces jammer to jam entire hopping bandwidth. Interleaving is needed to protect the decoder from burst channel errors. –The graphs in the backup charts show the P be with both ideal and non-ideal interleaving.

©2005, The Aerospace Corporation, All Rights Reserved 5 Scope and Limitations Spectral allocation limits S band electronic counter counter measures (ECCM) processing gain. X Band and Ka Band (21 GHz) would improve the processing gain over S band and are included herein as typical but not as exhaustive examples. C and Ku are not Government bands and not included. Since the uplink EIRP advantage is only bandwidth dependent Q band is included with its 3 dB bandwidth advantage.

©2005, The Aerospace Corporation, All Rights Reserved 6 Assumptions Satellites are at synchronous altitude. Secure TRANSEC will mitigate certain smart jammer attacks. The choice of modulation, coding and interleaving will greatly influence the performance in smart partial band jamming. Hop diversity count has a significant effect on the performance of a frequency hopped waveform in the presence of partial band jammers. –The interleaver needs to preserve a hop diversity of ~700. –To keep diversity related performance losses to 0.3 dB.

©2005, The Aerospace Corporation, All Rights Reserved 7 Link Parameters

©2005, The Aerospace Corporation, All Rights Reserved 8

©2005, The Aerospace Corporation, All Rights Reserved 9 Conclusions for Above Scenarios Uplink jammer EIRP needed to degrade a 60 dBW uplink is: –50 dBW with no frequency spreading –96 dBW with 80 MHz frequency spreading –130 dBW with 2 GHz frequency spreading The Jammer EIRP needed to degrade a 30 dBW EIRP synchronous altitude satellite downlink is: –-38 dBW at S Band with no frequency spreading. –8 dBW at S Band with 80 MHz frequency spreading. –39 dBW at 21 GHz with 1GHz frequency spreading.

©2005, The Aerospace Corporation, All Rights Reserved 10 Backup Slides on AJ Performance with Imperfect Interleaving

©2005, The Aerospace Corporation, All Rights Reserved 11

©2005, The Aerospace Corporation, All Rights Reserved 12 Waveform Background Non-ideal interleaving will allow smart jammers to degrade performance. –Slow hopping (many bits per hop) and partial band jamming creates burst errors. –Convolutional and turbo codes are very susceptible to degradation from burst errors. –Ideal interleaving will distribute bursts uniformly to mitigate the loss. Hop diversity is the number of hops across which the code block is spread. –Or the number of hops across which the content of a convolutional code’s path memory is spread –However, the interleaver may not provide enough depth or effective use of the hopping diversity. –This limitation can degrade both processing gain and anti-jam capability. The analysis and graphs later in this briefing show the effect of limited hop diversity.

©2005, The Aerospace Corporation, All Rights Reserved 13 Hop Diversity Analysis Approach The analysis calculates and plots the BER curve for various E b /N j. –and partial band fraction for various numbers of diversity hops, N h –with E b /N o set to 0. The envelope of P be for worst case jammer fraction at each E b /N j was determined. –The set of envelope curves for various values of diversity were plotted. The model sums the binomial weighted probabilities of error for each number of jammed hops out of a set of N h hops. This was repeated for several modulation and coding options. The waviness of some of the lines is due to the size of the step in the partial band fraction.

©2005, The Aerospace Corporation, All Rights Reserved 14 Definitions of Parameters The partial band Gaussian noise jammer fraction is r. The code is either –Convolutional with rate, r c of ½ and constraint length 7 –Or convolutional turbo with r c of ½, constraint length 5 and 5120 bit block size. The decoder transfer model was obtained –By fitting a judicious curve to the P be versus P cbe relationship, –Where P cej is the channel probability of error, –P be is the decoder output probability of error, –Given j of N h diversity hops are jammed. Code parameters definitions: –The linear scale factor for the code probability of error transfer model is a. –The exponential factor for the code probability of error transfer model is b. –It is closely related to half the minimum free distance of the code. –The curve corner fitting tightness factor for the code transfer model is n. P be is the sum over j of the decoded binomial distribution weighted P cej.

©2005, The Aerospace Corporation, All Rights Reserved 15 Analysis for DPSK Modulation Case

©2005, The Aerospace Corporation, All Rights Reserved 16 Modulation Performance for Coherent DPSK and BPSK Cases Is Respectively

©2005, The Aerospace Corporation, All Rights Reserved 17 Where the complementary error function is given by Sklar in “Digital Communications” 2 nd ed., p. 210 as:

©2005, The Aerospace Corporation, All Rights Reserved 18 Coding Parameters

©2005, The Aerospace Corporation, All Rights Reserved 19

©2005, The Aerospace Corporation, All Rights Reserved 20

©2005, The Aerospace Corporation, All Rights Reserved 21

©2005, The Aerospace Corporation, All Rights Reserved 22

©2005, The Aerospace Corporation, All Rights Reserved 23 Table of Graphs

©2005, The Aerospace Corporation, All Rights Reserved 24

©2005, The Aerospace Corporation, All Rights Reserved 25

©2005, The Aerospace Corporation, All Rights Reserved 26

©2005, The Aerospace Corporation, All Rights Reserved 27

©2005, The Aerospace Corporation, All Rights Reserved 28

©2005, The Aerospace Corporation, All Rights Reserved 29

©2005, The Aerospace Corporation, All Rights Reserved 30