Emulating Wireless Networks with High Fidelity RF Interference Modeling

Thomas Schucker, Tamal Bose, Bo Ryu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Wireless tactical data links such as Link-16 can experience a wide variety of interference from both allied communications and hostile jammers. This paper proposes a method to implement high-fidelity RF interference modeling in an emulated network using the open source CORE and EMANE software. A look up based statistical approach to define the RF interference in a pairwise RX/TX representation is inserted into the emulator at the physical (PHY) layer. This adjusts the reception in real time in order to analyze a network's performance in the presence of specific interference such as a jammer or another network using the same waveform. The comparative study conducted shows a percent error more than 95% for the base EMANE processing, in network packet loss, in our test setup with little degradation in emulation performance. Our algorithm reduces this error to almost zero.

Original languageEnglish (US)
Title of host publication2018 IEEE Military Communications Conference, MILCOM 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages822-828
Number of pages7
ISBN (Electronic)9781538671856
DOIs
StatePublished - Jul 2 2018
Event2018 IEEE Military Communications Conference, MILCOM 2018 - Los Angeles, United States
Duration: Oct 29 2018Oct 31 2018

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM
Volume2019-October

Conference

Conference2018 IEEE Military Communications Conference, MILCOM 2018
Country/TerritoryUnited States
CityLos Angeles
Period10/29/1810/31/18

Keywords

  • CORE
  • EMANE
  • Electronic Warfare
  • Link-16
  • Network Emulation
  • Tactical Data Link

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Emulating Wireless Networks with High Fidelity RF Interference Modeling'. Together they form a unique fingerprint.

Cite this