Ad Hoc雷達(dá)網(wǎng)攻擊技術(shù)研究
發(fā)布時間:2019-03-25 09:22
【摘要】:目前,雷達(dá)已與通信、導(dǎo)航、電子對抗等系統(tǒng)融為一體,成為高技術(shù)信息戰(zhàn)場中的重要角色。一批新體制雷達(dá)系統(tǒng)別樹一幟,并且與傳統(tǒng)的常規(guī)雷達(dá)系統(tǒng)相比,在雷達(dá)發(fā)射波形、收發(fā)天線數(shù)、信號處理流程等方面都有明顯的區(qū)別。新體制雷達(dá)抗干擾能力得到提高,無疑給電子對抗帶來了巨大的挑戰(zhàn),使得軍方獲取信息的能力和各系統(tǒng)聯(lián)合作戰(zhàn)的對抗方式與手段正在發(fā)生變革。組網(wǎng)雷達(dá)正是在這一新的軍事需求背景下誕生的一種新體制雷達(dá),并且受到各國科研人員越來越多的關(guān)注。本論文正是針對上述問題,以Ad Hoc雷達(dá)網(wǎng)作為研究對象,根據(jù)雷達(dá)網(wǎng)通信網(wǎng)絡(luò)的實際需要,選擇了合適的網(wǎng)絡(luò)拓?fù)浣Y(jié)構(gòu)。在分析了Ad Hoc網(wǎng)絡(luò)中各種路由協(xié)議的特性和雷達(dá)網(wǎng)在戰(zhàn)場環(huán)境下的路由需求基礎(chǔ)上開展了雷達(dá)網(wǎng)絡(luò)路由協(xié)議的研究。在完成Ad Hoc雷達(dá)網(wǎng)搭建的基礎(chǔ)上,分析了采用的路由協(xié)議易受干擾的薄弱環(huán)節(jié)并研究相應(yīng)的攻擊方法。主要內(nèi)容為:1.分析了Ad Hoc網(wǎng)絡(luò)的特點,并將其與其他無線網(wǎng)絡(luò)和常規(guī)有線網(wǎng)絡(luò)進(jìn)行比較,提出了Ad Hoc網(wǎng)絡(luò)適合用來組建雷達(dá)通信網(wǎng)絡(luò)的結(jié)論。分析了Ad Hoc網(wǎng)絡(luò)常見的拓?fù)浣Y(jié)構(gòu),根據(jù)雷達(dá)網(wǎng)絡(luò)通信要求的抗毀性及移動性,選擇了完全分布式結(jié)構(gòu)即平面結(jié)構(gòu)作為雷達(dá)網(wǎng)組網(wǎng)結(jié)構(gòu),為后續(xù)的路由協(xié)議的選擇及攻擊方法研究奠定基礎(chǔ)。2.分析了Ad Hoc網(wǎng)絡(luò)常用的路由協(xié)議。結(jié)合了雷達(dá)網(wǎng)在戰(zhàn)場環(huán)境下對路由協(xié)議的設(shè)計要求,提出了兩種典型路由協(xié)議AODV協(xié)議和DSDV協(xié)議進(jìn)行試組網(wǎng)并進(jìn)行仿真實驗。仿真表明,AODV協(xié)議更適合作為Ad Hoc雷達(dá)網(wǎng)的路由協(xié)議。3.深入分析了AODV路由協(xié)議的工作原理來研究攻擊方法。通過對AODV協(xié)議三種控制報文的分析研究,深入闡述了其路由工作過程中易受干擾的薄弱環(huán)節(jié)并分析了針對性的攻擊方法。研究了兩種有效的攻擊方法RREP攻擊和RRER攻擊對雷達(dá)網(wǎng)進(jìn)行攻擊仿真實驗,并探討了在惡意節(jié)點替換分組數(shù)據(jù)包開展欺騙攻擊的可能,對攻擊的效果進(jìn)行了分析。仿真實驗表明兩種攻擊方式都對雷達(dá)網(wǎng)有效,從不同角度削弱了雷達(dá)網(wǎng)的性能。
[Abstract]:At present, radar has been integrated with communication, navigation, electronic countermeasure and other systems, and has become an important role in high-tech information battlefield. Compared with the conventional radar system, there are obvious differences in the radar transmitting waveform, the number of receiving and receiving antennas, the signal processing flow, and so on. The improvement of radar anti-jamming ability of the new system has undoubtedly brought great challenge to the electronic countermeasure, which makes the military's ability to obtain information and the ways and means of the joint operation of each system being changed. Netting radar is a kind of new system radar which is born under the background of this new military demand and has been paid more and more attention by researchers from all over the world. Aiming at the above problems, this paper takes Ad Hoc radar network as the research object and chooses the appropriate network topology according to the actual needs of the communication network of the radar network. Based on the analysis of the characteristics of various routing protocols in Ad Hoc networks and the routing requirements of radar networks in battlefield environment, the research of radar network routing protocols is carried out. Based on the construction of Ad Hoc radar network, the weakness of the routing protocol is analyzed and the corresponding attack methods are studied. The main contents are: 1. This paper analyzes the characteristics of Ad Hoc network, compares it with other wireless networks and conventional wired networks, and puts forward a conclusion that Ad Hoc network is suitable for building radar communication network. In this paper, the common topology of Ad Hoc network is analyzed. According to the invulnerability and mobility of radar network communication, a completely distributed structure, plane structure, is chosen as radar network structure. To lay a foundation for the selection of subsequent routing protocols and the study of attack methods. 2. The routing protocols commonly used in Ad Hoc network are analyzed. According to the design requirements of radar network routing protocol in battlefield environment, two typical routing protocols, AODV protocol and DSDV protocol, are proposed for trial networking and simulation. The simulation results show that the AODV protocol is more suitable as the routing protocol for Ad Hoc radar networks. In this paper, the working principle of AODV routing protocol is analyzed to study the attack method. Through the analysis and research of three kinds of control packets of AODV protocol, the weak links which are vulnerable to interference in the routing process of the protocol are expounded, and the targeted attack methods are analyzed. In this paper, two effective attack methods, RREP attack and RRER attack, are studied to simulate the attack of radar network, and the possibility of spoofing attack on malicious nodes replacing packet packets is discussed, and the effect of the attack is analyzed. Simulation results show that both attack modes are effective against radar networks and weaken the performance of radar networks from different angles.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TN95
本文編號:2446845
[Abstract]:At present, radar has been integrated with communication, navigation, electronic countermeasure and other systems, and has become an important role in high-tech information battlefield. Compared with the conventional radar system, there are obvious differences in the radar transmitting waveform, the number of receiving and receiving antennas, the signal processing flow, and so on. The improvement of radar anti-jamming ability of the new system has undoubtedly brought great challenge to the electronic countermeasure, which makes the military's ability to obtain information and the ways and means of the joint operation of each system being changed. Netting radar is a kind of new system radar which is born under the background of this new military demand and has been paid more and more attention by researchers from all over the world. Aiming at the above problems, this paper takes Ad Hoc radar network as the research object and chooses the appropriate network topology according to the actual needs of the communication network of the radar network. Based on the analysis of the characteristics of various routing protocols in Ad Hoc networks and the routing requirements of radar networks in battlefield environment, the research of radar network routing protocols is carried out. Based on the construction of Ad Hoc radar network, the weakness of the routing protocol is analyzed and the corresponding attack methods are studied. The main contents are: 1. This paper analyzes the characteristics of Ad Hoc network, compares it with other wireless networks and conventional wired networks, and puts forward a conclusion that Ad Hoc network is suitable for building radar communication network. In this paper, the common topology of Ad Hoc network is analyzed. According to the invulnerability and mobility of radar network communication, a completely distributed structure, plane structure, is chosen as radar network structure. To lay a foundation for the selection of subsequent routing protocols and the study of attack methods. 2. The routing protocols commonly used in Ad Hoc network are analyzed. According to the design requirements of radar network routing protocol in battlefield environment, two typical routing protocols, AODV protocol and DSDV protocol, are proposed for trial networking and simulation. The simulation results show that the AODV protocol is more suitable as the routing protocol for Ad Hoc radar networks. In this paper, the working principle of AODV routing protocol is analyzed to study the attack method. Through the analysis and research of three kinds of control packets of AODV protocol, the weak links which are vulnerable to interference in the routing process of the protocol are expounded, and the targeted attack methods are analyzed. In this paper, two effective attack methods, RREP attack and RRER attack, are studied to simulate the attack of radar network, and the possibility of spoofing attack on malicious nodes replacing packet packets is discussed, and the effect of the attack is analyzed. Simulation results show that both attack modes are effective against radar networks and weaken the performance of radar networks from different angles.
【學(xué)位授予單位】:電子科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TN95
【參考文獻(xiàn)】
相關(guān)期刊論文 前2條
1 陳偉;俞雷;張迎周;;802.11協(xié)議中RTS/CTS機(jī)制的安全漏洞分析[J];計算機(jī)應(yīng)用;2008年12期
2 郭冠斌,方青;雷達(dá)組網(wǎng)技術(shù)的現(xiàn)狀與發(fā)展[J];雷達(dá)科學(xué)與技術(shù);2005年04期
相關(guān)碩士學(xué)位論文 前3條
1 楊飛;移動Ad Hoc網(wǎng)絡(luò)攻擊技術(shù)研究[D];杭州電子科技大學(xué);2013年
2 徐瑞;移動自組織網(wǎng)絡(luò)MAC協(xié)議的攻擊技術(shù)研究[D];杭州電子科技大學(xué);2011年
3 劉偉;關(guān)于Ad hoc網(wǎng)絡(luò)安全性的路由層研究[D];山東大學(xué);2007年
,本文編號:2446845
本文鏈接:http://www.wukwdryxk.cn/kejilunwen/xinxigongchenglunwen/2446845.html
最近更新
教材專著