PassIve degradatIon attacks

نویسنده

  • Carlo Kopp
چکیده

The traditional approach to discussing this problem is usually split into two separate discussions, one dealing with technical Electronic Warfare measures against sensor equipment and another dealing with deceptions aimed at operators and imagery analysts or interpreters. This way of looking at the problem is increasingly problematic, with increasing levels of automation in ISR systems, especially in terms of automated cueing operators or analysts to items of interest in the ISR picture. Where do we draw the line between ‘technological’ deceptions aimed at automated machinery in ISR versus the human ‘wetware’ of the ISR system user? A much more general approach to this problem is to look at the deceptive measures in the framework of the four canonical strategies of IW (refer previous NCW101) and identify whether the deception is targeted at the ISR sensor/system’s capability to gather raw data or its capability to interpret the raw data, accepting that the intended victim may be a piece of hardware, software and/or wetware. In effect, we look at the victim’s networked system as a system, rather than its disparate parts. ISR systems today can be broadly divided into radar based, passive (RF) radio-frequency based and electro-optical (EO) based systems, often fused with geographical or other databases intended to aid interpretation and further exploitation. A radar based system may involve the use of imaging 2D or even 3D synthetic aperture radar, inverse-synthetic aperture radar, narrowband or ultra-wideband radar, earth and foliage penetrating radar, ground, air or maritime moving target indicator radar using DPCA techniques, or pulse Doppler radar. Some of these radars produce imagery of areas or objects, and some produce coordinate, kinematic and often identification data for targets as outputs. Many modern radars can interleave these modes and fuse the outputs into a single situational picture, containing imagery output, kinematic and ident parameters for targets. This increasingly creates vulnerabilities for a sophisticated attacker to exploit. Passive RF sensors will typically locate a threat emitter with some accuracy, and identify it with the most sophisticated systems capable of accurate geolocation and ‘fingerprinting’ of specific pieces of emitter equipment, based on production tolerance caused variations in signal format. EO sensors vary widely in effective range, sensitivity, resolution, and may operate in visible, near Infrared / shortwave, mid-Infrared / midwave and far infrared / longwave bands, or if a hyperspectral sensor, it may operate over dozens or even hundreds of bands. Imagers may be framing cameras, video cameras and pushbroom stripmappers or linescanners.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Passive Security Threats and Consequences in IEEE 802.11 Wireless Mesh Networks

The Wireless Mesh Network (WMN) is ubiquitous emerging broadband wireless network. However, the open wireless medium, multi-hop multi-radio architecture and ad-hoc connectivity amongst endusers are such characteristics which increases the vulnerabilities of WMN towards many passive and active attacks. A secure network ensures the confidentiality, integrity and availability of wireless network. ...

متن کامل

Linear HB ( NLHB ) Protocol Against Passive Attack

As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to HB, NLHB relies on the complexity of decoding a class of non-linear codes to render the passive attacks proposed against HB ineffective. Based on the fact that there has been no pa...

متن کامل

Variants of Hb Protocols for Rfid Security

Radio Frequency Identification (RFID) has received recently a great attention from large organizations and researchers due to the dropping tag costs and vigorous RFID standardization. They are becoming more common in daily use to identify, locate and track people, assets, and animals. Number of protocols has been proposed in the literature for the security of RFID against passive attacks. One o...

متن کامل

The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure

A well-known cryptographic scenario is the following: a smart card wishes to compute an RSA signature with the help of an untrusted powerful server. Several protocols have been proposed to solve this problem , and many have been broken. There exist two kinds of attacks against such protocols: passive attacks (where the server follows the instructions) and active attacks (where the server may re...

متن کامل

On the Insecurity of a Server-Aided RSA Protocol

At Crypto ’88, Matsumoto, Kato and Imai proposed a protocol, known as RSA-S1, in which a smart card computes an RSA signature, with the help of an untrusted powerful server. There exist two kinds of attacks against such protocols: passive attacks (where the server does not deviate from the protocol) and active attacks (where the server may return false values). Pfitzmann and Waidner presented a...

متن کامل

Some attacks against vehicles' passive entry security systems and their solutions

Recently, several companies have introduced passive entry systems for automotive applications. These systems are intended to increase user comfort by eliminating the requirement that the user has to reach for the customer identification device (CID), a credit card like tool, to gain access to the vehicle compartment. While this extra level of comfort is a desirable feature, especially in luxury...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008