2020
DOI: 10.1109/taes.2020.3000001
|View full text |Cite
|
Sign up to set email alerts
|

Implementation and Assessment of Jamming Effectiveness Against an FMCW Tracking Radar Based on a Novel Criterion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…This limitation may be caused by energy or hardware constraints, or attack strategy adopted. For instance, an attacker may use a laser for compromising all the vision sensors at different time, but at each time, only one single vision sensor may be affected due to a small beam length of the laser [6]; a radio generator capable of sending radio signals with different frequencies can be used to compromise multiple radars at different time, but only one radar can be affected at each time [32].…”
Section: Assumptionmentioning
confidence: 99%
See 2 more Smart Citations
“…This limitation may be caused by energy or hardware constraints, or attack strategy adopted. For instance, an attacker may use a laser for compromising all the vision sensors at different time, but at each time, only one single vision sensor may be affected due to a small beam length of the laser [6]; a radio generator capable of sending radio signals with different frequencies can be used to compromise multiple radars at different time, but only one radar can be affected at each time [32].…”
Section: Assumptionmentioning
confidence: 99%
“…However, note that it is still possible that η(t) = 0 for some t ≥ 0 but inequality (30) still holds, which results in a failure of detection. To increase the detection rate of our algorithm, we perform attack detection over every time window of length T ∈ N. That is, for each t ∈ [iT, (i + 1)T ), i ∈ N, we check if (32) is satisfied for all t in the time window. If there exists t 1 ∈ [iT, (i + 1)T ), i ∈ N such that (32) holds, we say that sensors are under attack in the i-th time window.…”
Section: A Detection Strategymentioning
confidence: 99%
See 1 more Smart Citation
“…Although the de‐spreading process, performed in both acquisition and tracking stages, improves the SNR, the GNSS receivers are still susceptible to jamming attacks. Jamming and spoofing attacks are used as a modern threat and novel battle domains [3, 4]. For example, they are used to cause some problems in the positioning of the platforms or to forced‐landing deception of aerial platforms.…”
Section: Introductionmentioning
confidence: 99%