Font Size: a A A

Research On Tactical Internet Confrontation

Posted on:2010-10-03Degree:MasterType:Thesis
Country:ChinaCandidate:F YuFull Text:PDF
GTID:2178360272482595Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
The application and development of Internet technology on the battlefield have given birth to an important battlefield information transmission network of modern information warfare—Tactical Internet. The tactical Internet is an intelligent network which is highly efficient, interoperable, seamless. It speeds up the campaign rhythm, strengthens the Group's combat capability and improves information collection, processing, distribution and display capability.Because of the importance of Tactical Internet in future battlefield, it is a positive meaning to research the combat strategy on the Tactical Internet. The dissertation outlines the definition of Tactical Internet, functions and the development of the status quo; because of the use of a large number of commercial Internet technology in the Tactical Internet, discusses the vulnerabilities of it can be discusser from hosts and routes. In the dissertation, MAC and network layer (route) are selected as the breakthrough points, the limited wireless bandwidth resources and the capture effect when the 802.11 protocol is used, these have serious impact on the communication function of the Tactical Internet, the methods which make use of the impact is discussed. In this way, legal nodes are prevented from capturing the channel, as a result the routing can not be established; researches on the threats of wireless routing and selects the AODV protocol as a target, analyses its working principle, discusses the attack methods used in the process that routing is establishing or maintaining, study the effect caused by these methods; the simulation network model are built by using OPNET software, the simulation validates the effect result from these attack methods,the research on the result is done; Simulation results show that these methods can achieve the desire effect basically, in accordance with different categories based on attacking effect, a brief evaluation on these methods is made.
Keywords/Search Tags:Tactical Internet, Attack, Vulnerabilities, MAC, Wireless routing
PDF Full Text Request
Related items