当前位置:主页 > 科技论文 > 信息工程论文 >

Ad Hoc雷达网攻击技术研究

发布时间:2019-03-25 09:22
【摘要】:目前,雷达已与通信、导航、电子对抗等系统融为一体,成为高技术信息战场中的重要角色。一批新体制雷达系统别树一帜,并且与传统的常规雷达系统相比,在雷达发射波形、收发天线数、信号处理流程等方面都有明显的区别。新体制雷达抗干扰能力得到提高,无疑给电子对抗带来了巨大的挑战,使得军方获取信息的能力和各系统联合作战的对抗方式与手段正在发生变革。组网雷达正是在这一新的军事需求背景下诞生的一种新体制雷达,并且受到各国科研人员越来越多的关注。本论文正是针对上述问题,以Ad Hoc雷达网作为研究对象,根据雷达网通信网络的实际需要,选择了合适的网络拓扑结构。在分析了Ad Hoc网络中各种路由协议的特性和雷达网在战场环境下的路由需求基础上开展了雷达网络路由协议的研究。在完成Ad Hoc雷达网搭建的基础上,分析了采用的路由协议易受干扰的薄弱环节并研究相应的攻击方法。主要内容为:1.分析了Ad Hoc网络的特点,并将其与其他无线网络和常规有线网络进行比较,提出了Ad Hoc网络适合用来组建雷达通信网络的结论。分析了Ad Hoc网络常见的拓扑结构,根据雷达网络通信要求的抗毁性及移动性,选择了完全分布式结构即平面结构作为雷达网组网结构,为后续的路由协议的选择及攻击方法研究奠定基础。2.分析了Ad Hoc网络常用的路由协议。结合了雷达网在战场环境下对路由协议的设计要求,提出了两种典型路由协议AODV协议和DSDV协议进行试组网并进行仿真实验。仿真表明,AODV协议更适合作为Ad Hoc雷达网的路由协议。3.深入分析了AODV路由协议的工作原理来研究攻击方法。通过对AODV协议三种控制报文的分析研究,深入阐述了其路由工作过程中易受干扰的薄弱环节并分析了针对性的攻击方法。研究了两种有效的攻击方法RREP攻击和RRER攻击对雷达网进行攻击仿真实验,并探讨了在恶意节点替换分组数据包开展欺骗攻击的可能,对攻击的效果进行了分析。仿真实验表明两种攻击方式都对雷达网有效,从不同角度削弱了雷达网的性能。
[Abstract]:At present, radar has been integrated with communication, navigation, electronic countermeasure and other systems, and has become an important role in high-tech information battlefield. Compared with the conventional radar system, there are obvious differences in the radar transmitting waveform, the number of receiving and receiving antennas, the signal processing flow, and so on. The improvement of radar anti-jamming ability of the new system has undoubtedly brought great challenge to the electronic countermeasure, which makes the military's ability to obtain information and the ways and means of the joint operation of each system being changed. Netting radar is a kind of new system radar which is born under the background of this new military demand and has been paid more and more attention by researchers from all over the world. Aiming at the above problems, this paper takes Ad Hoc radar network as the research object and chooses the appropriate network topology according to the actual needs of the communication network of the radar network. Based on the analysis of the characteristics of various routing protocols in Ad Hoc networks and the routing requirements of radar networks in battlefield environment, the research of radar network routing protocols is carried out. Based on the construction of Ad Hoc radar network, the weakness of the routing protocol is analyzed and the corresponding attack methods are studied. The main contents are: 1. This paper analyzes the characteristics of Ad Hoc network, compares it with other wireless networks and conventional wired networks, and puts forward a conclusion that Ad Hoc network is suitable for building radar communication network. In this paper, the common topology of Ad Hoc network is analyzed. According to the invulnerability and mobility of radar network communication, a completely distributed structure, plane structure, is chosen as radar network structure. To lay a foundation for the selection of subsequent routing protocols and the study of attack methods. 2. The routing protocols commonly used in Ad Hoc network are analyzed. According to the design requirements of radar network routing protocol in battlefield environment, two typical routing protocols, AODV protocol and DSDV protocol, are proposed for trial networking and simulation. The simulation results show that the AODV protocol is more suitable as the routing protocol for Ad Hoc radar networks. In this paper, the working principle of AODV routing protocol is analyzed to study the attack method. Through the analysis and research of three kinds of control packets of AODV protocol, the weak links which are vulnerable to interference in the routing process of the protocol are expounded, and the targeted attack methods are analyzed. In this paper, two effective attack methods, RREP attack and RRER attack, are studied to simulate the attack of radar network, and the possibility of spoofing attack on malicious nodes replacing packet packets is discussed, and the effect of the attack is analyzed. Simulation results show that both attack modes are effective against radar networks and weaken the performance of radar networks from different angles.
【学位授予单位】:电子科技大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN95

【参考文献】

相关期刊论文 前2条

1 陈伟;俞雷;张迎周;;802.11协议中RTS/CTS机制的安全漏洞分析[J];计算机应用;2008年12期

2 郭冠斌,方青;雷达组网技术的现状与发展[J];雷达科学与技术;2005年04期

相关硕士学位论文 前3条

1 杨飞;移动Ad Hoc网络攻击技术研究[D];杭州电子科技大学;2013年

2 徐瑞;移动自组织网络MAC协议的攻击技术研究[D];杭州电子科技大学;2011年

3 刘伟;关于Ad hoc网络安全性的路由层研究[D];山东大学;2007年



本文编号:2446845

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2446845.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户9f13f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com