164 research outputs found

    Radar Signal Processing for Interference Mitigation

    Get PDF
    It is necessary for radars to suppress interferences to near the noise level to achieve the best performance in target detection and measurements. In this dissertation work, innovative signal processing approaches are proposed to effectively mitigate two of the most common types of interferences: jammers and clutter. Two types of radar systems are considered for developing new signal processing algorithms: phased-array radar and multiple-input multiple-output (MIMO) radar. For phased-array radar, an innovative target-clutter feature-based recognition approach termed as Beam-Doppler Image Feature Recognition (BDIFR) is proposed to detect moving targets in inhomogeneous clutter. Moreover, a new ground moving target detection algorithm is proposed for airborne radar. The essence of this algorithm is to compensate for the ground clutter Doppler shift caused by the moving platform and then to cancel the Doppler-compensated clutter using MTI filters that are commonly used in ground-based radar systems. Without the need of clutter estimation, the new algorithms outperform the conventional Space-Time Adaptive Processing (STAP) algorithm in ground moving target detection in inhomogeneous clutter. For MIMO radar, a time-efficient reduced-dimensional clutter suppression algorithm termed as Reduced-dimension Space-time Adaptive Processing (RSTAP) is proposed to minimize the number of the training samples required for clutter estimation. To deal with highly heterogeneous clutter more effectively, we also proposed a robust deterministic STAP algorithm operating on snapshot-to-snapshot basis. For cancelling jammers in the radar mainlobe direction, an innovative jamming elimination approach is proposed based on coherent MIMO radar adaptive beamforming. When combined with mutual information (MI) based cognitive radar transmit waveform design, this new approach can be used to enable spectrum sharing effectively between radar and wireless communication systems. The proposed interference mitigation approaches are validated by carrying out simulations for typical radar operation scenarios. The advantages of the proposed interference mitigation methods over the existing signal processing techniques are demonstrated both analytically and empirically

    Relevance of polynomial matrix decompositions to broadband blind signal separation

    Get PDF
    The polynomial matrix EVD (PEVD) is an extension of the conventional eigenvalue decomposition (EVD) to polynomial matrices. The purpose of this article is to provide a review of the theoretical foundations of the PEVD and to highlight practical applications in the area of broadband blind source separation (BSS). Based on basic definitions of polynomial matrix terminology such as parahermitian and paraunitary matrices, strong decorrelation and spectral majorization, the PEVD and its theoretical foundations will be briefly outlined. The paper then focuses on the applicability of the PEVD and broadband subspace techniques — enabled by the diagonalization and spectral majorization capabilities of PEVD algorithms—to define broadband BSS solutions that generalise well-known narrowband techniques based on the EVD. This is achieved through the analysis of new results from three exemplar broadband BSS applications — underwater acoustics, radar clutter suppression, and domain-weighted broadband beamforming — and their comparison with classical broadband methods

    Blind source separation for interference cancellation in CDMA systems

    Get PDF
    Communication is the science of "reliable" transfer of information between two parties, in the sense that the information reaches the intended party with as few errors as possible. Modern wireless systems have many interfering sources that hinder reliable communication. The performance of receivers severely deteriorates in the presence of unknown or unaccounted interference. The goal of a receiver is then to combat these sources of interference in a robust manner while trying to optimize the trade-off between gain and computational complexity. Conventional methods mitigate these sources of interference by taking into account all available information and at times seeking additional information e.g., channel characteristics, direction of arrival, etc. This usually costs bandwidth. This thesis examines the issue of developing mitigating algorithms that utilize as little as possible or no prior information about the nature of the interference. These methods are either semi-blind, in the former case, or blind in the latter case. Blind source separation (BSS) involves solving a source separation problem with very little prior information. A popular framework for solving the BSS problem is independent component analysis (ICA). This thesis combines techniques of ICA with conventional signal detection to cancel out unaccounted sources of interference. Combining an ICA element to standard techniques enables a robust and computationally efficient structure. This thesis proposes switching techniques based on BSS/ICA effectively to combat interference. Additionally, a structure based on a generalized framework termed as denoising source separation (DSS) is presented. In cases where more information is known about the nature of interference, it is natural to incorporate this knowledge in the separation process, so finally this thesis looks at the issue of using some prior knowledge in these techniques. In the simple case, the advantage of using priors should at least lead to faster algorithms.reviewe

    Co-Channel Interference Between IEEE 802.11 WLAN and Bluetooth

    Get PDF
    Electrical Engineering Technolog

    Reconfigurable Intelligent Surface for Physical Layer Security in 6G-IoT: Designs, Issues, and Advances

    Full text link
    Sixth-generation (6G) networks pose substantial security risks because confidential information is transmitted over wireless channels with a broadcast nature, and various attack vectors emerge. Physical layer security (PLS) exploits the dynamic characteristics of wireless environments to provide secure communications, while reconfigurable intelligent surfaces (RISs) can facilitate PLS by controlling wireless transmissions. With RIS-aided PLS, a lightweight security solution can be designed for low-end Internet of Things (IoT) devices, depending on the design scenario and communication objective. This article discusses RIS-aided PLS designs for 6G-IoT networks against eavesdropping and jamming attacks. The theoretical background and literature review of RIS-aided PLS are discussed, and design solutions related to resource allocation, beamforming, artificial noise, and cooperative communication are presented. We provide simulation results to show the effectiveness of RIS in terms of PLS. In addition, we examine the research issues and possible solutions for RIS modeling, channel modeling and estimation, optimization, and machine learning. Finally, we discuss recent advances, including STAR-RIS and malicious RIS.Comment: Accepted for IEEE Internet of Things Journa

    Formal modelling and analysis of denial of services attacks in wireless sensor networks

    Get PDF
    Wireless Sensor Networks (WSNs) have attracted considerable research attention in recent years because of the perceived potential benefits offered by self-organising, multi-hop networks consisting of low-cost and small wireless devices for monitoring or control applications in di±cult environments. WSN may be deployed in hostile or inaccessible environments and are often unattended. These conditions present many challenges in ensuring that WSNs work effectively and survive long enough to fulfil their functionalities. Securing a WSN against any malicious attack is a particular challenge. Due to the limited resources of nodes, traditional routing protocols are not appropriate in WSNs and innovative methods are used to route data from source nodes to sink nodes (base stations). To evaluate the routing protocols against DoS attacks, an innovative design method of combining formal modelling and computer simulations has been proposed. This research has shown that by using formal modelling hidden bugs (e.g. vulnerability to attacks) in routing protocols can be detected automatically. In addition, through a rigorous testing, a new routing protocol, RAEED (Robust formally Analysed protocol for wirEless sEnsor networks Deployment), was developed which is able to operate effectively in the presence of hello flood, rushing, wormhole, black hole, gray hole, sink hole, INA and jamming attacks. It has been proved formally and using computer simulation that the RAEED can pacify these DoS attacks. A second contribution of this thesis relates to the development of a framework to check the vulnerability of different routing protocols against Denial of Service(DoS) attacks. This has allowed us to evaluate formally some existing and known routing protocols against various DoS attacks iand these include TinyOS Beaconing, Authentic TinyOS using uTesla, Rumour Routing, LEACH, Direct Diffusion, INSENS, ARRIVE and ARAN protocols. This has resulted in the development of an innovative and simple defence technique with no additional hardware cost for deployment against wormhole and INA attacks. In the thesis, the detection of weaknesses in INSENS, Arrive and ARAN protocols was also addressed formally. Finally, an e±cient design methodology using a combination of formal modelling and simulation is propose to evaluate the performances of routing protocols against DoS attacks
    • …
    corecore