Knowledge (XXG)

Transmission security

Source 📝

25: 259: 158:
It is particularly vital in military and government communication systems, where the security of transmitted data is critical to prevent adversaries from gathering intelligence or disrupting operations. TRANSEC is often implemented alongside COMSEC (Communications Security) to form a comprehensive approach to communication security.
157:
This involves securing communication links from being compromised by techniques like jamming, eavesdropping, and signal interception. TRANSEC includes the use of frequency hopping, spread spectrum, encryption, and the physical protection of communication links to obscure the patterns of transmission.
42: 296: 128:) that results from the application of measures designed to protect transmissions from interception and exploitation by means other than 150: 232:
2012 6th Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop (SPSC)
108: 89: 61: 320: 68: 46: 136: 75: 325: 57: 35: 289: 315: 282: 82: 206: 178: 162: 266: 235: 166: 309: 174: 146: 129: 227: 239: 170: 226:
Rodriguez Bejarano, Juan Manuel; Yun, Ana; De La Cuesta, Borja (September 2012).
24: 194: 228:"Security in IP satellite networks: COMSEC and TRANSEC integration aspects" 258: 190: 125: 186: 18: 270: 161:
Methods used to achieve transmission security include
49:. Unsourced material may be challenged and removed. 290: 124:is the component of communications security ( 8: 297: 283: 132:. Goals of transmission security include: 109:Learn how and when to remove this message 265:This cryptography-related article is a 218: 173:sequence generation is controlled by a 7: 255: 253: 47:adding citations to reliable sources 16:Component of communications security 269:. You can help Knowledge (XXG) by 142:Low probability of detection (LPD) 14: 257: 189:TRANSEC-equipped radios include 183:transmission security keys (TSK) 23: 137:Low probability of interception 122:Transmission security (TRANSEC) 34:needs additional citations for 240:10.1109/asms-spsc.2012.6333089 145:Antijam — resistance to 1: 342: 252: 181:. Such keys are known as 321:Military communications 58:"Transmission security" 43:improve this article 169:where the required 326:Cryptography stubs 207:Electronic warfare 185:. Modern U.S. and 278: 277: 234:. IEEE: 281–288. 163:frequency hopping 119: 118: 111: 93: 333: 299: 292: 285: 261: 254: 244: 243: 223: 114: 107: 103: 100: 94: 92: 51: 27: 19: 341: 340: 336: 335: 334: 332: 331: 330: 306: 305: 304: 303: 250: 248: 247: 225: 224: 220: 215: 203: 167:spread spectrum 115: 104: 98: 95: 52: 50: 40: 28: 17: 12: 11: 5: 339: 337: 329: 328: 323: 318: 308: 307: 302: 301: 294: 287: 279: 276: 275: 262: 246: 245: 217: 216: 214: 211: 210: 209: 202: 199: 177:algorithm and 155: 154: 143: 140: 117: 116: 99:September 2024 31: 29: 22: 15: 13: 10: 9: 6: 4: 3: 2: 338: 327: 324: 322: 319: 317: 314: 313: 311: 300: 295: 293: 288: 286: 281: 280: 274: 272: 268: 263: 260: 256: 251: 241: 237: 233: 229: 222: 219: 212: 208: 205: 204: 200: 198: 196: 192: 188: 184: 180: 176: 175:cryptographic 172: 168: 164: 159: 152: 148: 144: 141: 138: 135: 134: 133: 131: 130:cryptanalysis 127: 123: 113: 110: 102: 91: 88: 84: 81: 77: 74: 70: 67: 63: 60: –  59: 55: 54:Find sources: 48: 44: 38: 37: 32:This article 30: 26: 21: 20: 316:Cryptography 271:expanding it 264: 249: 231: 221: 182: 171:pseudorandom 160: 156: 121: 120: 105: 96: 86: 79: 72: 65: 53: 41:Please help 36:verification 33: 310:Categories 213:References 195:HAVE QUICK 69:newspapers 201:See also 191:SINCGARS 149:(EPM or 147:jamming 83:scholar 126:COMSEC 85:  78:  71:  64:  56:  139:(LPI) 90:JSTOR 76:books 267:stub 193:and 187:NATO 165:and 151:ECCM 62:news 236:doi 179:key 45:by 312:: 230:. 197:. 298:e 291:t 284:v 273:. 242:. 238:: 153:) 112:) 106:( 101:) 97:( 87:· 80:· 73:· 66:· 39:.

Index


verification
improve this article
adding citations to reliable sources
"Transmission security"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
COMSEC
cryptanalysis
Low probability of interception
jamming
ECCM
frequency hopping
spread spectrum
pseudorandom
cryptographic
key
NATO
SINCGARS
HAVE QUICK
Electronic warfare
"Security in IP satellite networks: COMSEC and TRANSEC integration aspects"
doi
10.1109/asms-spsc.2012.6333089
Stub icon
stub

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.