Proceedings of MILCOM '94
DOI: 10.1109/milcom.1994.473919
|View full text |Cite
|
Sign up to set email alerts
|

Maximum capacity prediction and anti-jam performance analysis for commercial satellite communication systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The dependence on successful message reception is a weakness in the protocol that would make the protocol susceptible to DoS conditions. The security of the communication could be compromised by an attacker through intentional message jamming and the jamming of a mobile user can be easily achieved through using low-grade technology [14]- [16]. If the last message is not successfully delivered to principal B, then the attacker could send a random value to B, encrypted with the public key of B.…”
Section: E a Dos Attack On Mscpmentioning
confidence: 99%
“…The dependence on successful message reception is a weakness in the protocol that would make the protocol susceptible to DoS conditions. The security of the communication could be compromised by an attacker through intentional message jamming and the jamming of a mobile user can be easily achieved through using low-grade technology [14]- [16]. If the last message is not successfully delivered to principal B, then the attacker could send a random value to B, encrypted with the public key of B.…”
Section: E a Dos Attack On Mscpmentioning
confidence: 99%
“…Such jamming can be achieved with a lowpower jammer. Information on the feasibility of jamming a handset's uplink and downlink in a satellite-based communications system is presented in Lee and Marshall (1994), United States General Accounting Office (2002), Rausch (2006). The attack can also be realised by jamming the NCC's messages on the uplink from the gateway to the LEO.…”
Section: Realising the Presented Desynchronisation Attacks In A Satel...mentioning
confidence: 99%
“…Loss of messages can happen either by unintended interference or intentionally as a result of a jamming attack by an intruder. Jamming of messages can be achieved with a low-power jammer (Mahoney et al, 1999;Felstead & Keightley, 1995;Lee & Marshall, 1994).…”
Section: Analysis Of the CC Protocolmentioning
confidence: 99%