190 research outputs found

    Waveform design and processing techniques in OFDM radar

    Get PDF
    Includes bibliographical referencesWith the advent of powerful digital hardware, software defined radio and radar have become an active area of research and development. This in turn has given rise to many new research directions in the radar community, which were previously not comprehensible. One such direction is the recently investigated OFDM radar, which uses OFDM waveforms instead of the classic linear frequency mod- ulated waveforms. Being a wideband signal, the OFDM symbol offers spectral efficiency along with improved range resolution, two enticing characteristics for radar. Historically a communication signal, OFDM is a special form of multi- carrier modulation, where a single data stream is transmitted over a number of lower rate carriers. The information is conveyed via sets of complex phase codes modulating the phase of the carriers. At the receiver, a demodulation stage estimates the transmitted phase codes and the information in the form of binary words is finally retrieved. In radar, the primary goal is to detect the presence of targets and possibly estimate some of their features through measurable quantities, e.g. range, Doppler, etc. Yet, being a young waveform in radar, more understanding is required to turn it into a standard radar waveform. Our goal, with this thesis, is to mature our comprehension of OFDM for radar and contribute to the realm of OFDM radar. First, we develop two processing alternatives for the case of a train of wideband OFDM pulses. In this, our first so-called time domain solution consists in applying a matched filter to compress the received echoes in the fast time before applying a fast Fourier transform in the slow time to form the range Doppler image. We motivate this approach after demonstrating that short OFDM pulses are Doppler tolerant. The merit of this approach is to conserve existing radar architectures while operating OFDM waveforms. The second so-called frequency domain solution that we propose is inspired from communication engineering research since the received echoes are tumbled in the frequency domain. After several manipulations, the range Doppler image is formed. We explain how this approach allows to retrieve an estimate of the unambiguous radial velocity, and propose two methods for that. The first method requires the use of identical sequence (IS) for the phase codes and is, as such, binding, while the other method works irrespective of the phase codes. Like the previous technique, this processing solution accommodates high Doppler frequencies and the degradation in the range Doppler image is negligible provided that the spacing between consecutive subcarriers is sufficient. Unfortunately, it suffers from the issue of intersymbol interference (ISI). After observing that both solutions provide the same processing gain, we clarify the constraints that shall apply to the OFDM signals in either of these solutions. In the first solution, special care has been employed to design OFDM pulses with low peak-to-mean power ratio (PMEPR) and low sidelobe level in the autocorrelation function. In the second solution, on the other hand, only the constraint of low PMEPR applies since the sidelobes of the scatterer characteristic function in the range Doppler image are Fourier based. Then, we develop a waveform-processing concept for OFDM based stepped frequency waveforms. This approach is intended for high resolution radar with improved low probability of detection (LPD) characteristics, as we propose to employ a frequency hopping scheme from pulse to pulse other than the conventional linear one. In the same way we treated our second alternative earlier, we derive our high range resolution processing in matrix terms and assess the degradation caused by high Doppler on the range profile. We propose using a bank of range migration filters to retrieve the radial velocity of the scatterer and realise that the issue of classical ambiguity in Doppler can be alleviated provided that the relative bandwidth, i.e. the total bandwidth covered by the train of pulses divided by the carrier frequency, is chosen carefully. After discussing a deterministic artefact caused by frequency hopping and the means to reduce it at the waveform design or processing level, we discuss the benefit offered by our concept in comparison to other standard wideband methods and emphasize on its LPD characteristics at the waveform and pulse level. In our subsequent analysis, we investigate genetic algorithm (GA) based techniques to finetune OFDM pulses in terms of radar requirements viz., low PMEPR only or low PMEPR and low sidelobe level together, as evoked earlier. To motivate the use of genetic algorithms, we establish that existing techniques are not exible in terms of the OFDM structure (the assumption that all carriers are present is always made). Besides, the use of advanced objective functions suited to particular configurations (e.g. low sidelobe level in proximity of the main autocorrelation peak) as well as the combination of multiple objective functions can be done elegantly with GA based techniques. To justify that solely phase codes are used for our optimisation(s), we stress that the weights applied to the carriers composing the OFDM signal can be spared to cope with other radar related challenges and we give an example with a case of enhanced detection. Next, we develop a technique where we exploit the instantaneous wideband trans- mission to characterise the type of the canonical scatterers that compose a target. Our idea is based on the well-established results from the geometrical theory of diffraction (GTD), where the scattered energy varies with frequency. We present the problem related to ISI, stress the need to design the transmitted pulse so as to reduce this risk and suggest having prior knowledge over the scatterers relative positions. Subsequently, we develop a performance analysis to assess the behaviour of our technique in the presence of additive white Gaussian noise (AWGN). Then, we demonstrate the merit of integrating over several pulses to improve the characterisation rate of the scatterers. Because the scattering centres of a target resonate variably at different frequencies, frequency diversity is another enticing property which can be used to enhance the sensing performance. Here, we exploit this element of diversity to improve the classification function. We develop a technique where the classification takes place at the waveform design when few targets are present. In our case study, we have three simple targets. Each is composed of perfectly electrically conducting spheres for which we have exact models of the scattered field. We develop a GA based search to find optimal OFDM symbols that best discriminate one target against any other. Thereafter, the OFDM pulse used for probing the target in the scene is constructed by stacking the resulting symbols in time. After discussing the problem of finding the best frequency window to sense the target, we develop a performance analysis where our figure of merit is the overall probability of correct classification. Again, we prove the merit of integrating over several pulses to reach classification rates above 95%. In turn, this study opens onto new challenges in the realm of OFDM radar. We leave for future research the demonstration of the practical applicability of our novel concepts and mention manifold research axes, viz., a signal processing axis that would include methods to cope with inter symbol interference, range migration issues, methods to raise the ambiguity in Doppler when several echoes from distinct scatterers overlap in the case of our frequency domain processing solutions; an algorithmic axis that would concern the heuristic techniques employed in the design of our OFDM pulses. We foresee that further tuning might help speeding up our GA based algorithms and we expect that constrained multi- objective optimisation GA (MOO-GA) based techniques shall benefit the OFDM pulse design problem in radar. A system design axis that would account for the hardware components' behaviours, when possible, directly at the waveform design stage and would include implementation of the OFDM radar system

    Physical Layer Securities in Wireless Communication Systems

    Get PDF
    Due to the tremendous advancement in the semiconductor and microelectronics technologies, wireless technologies have blossomed in the recent decades. The large scale deployment of wireless networks have revolutionized the way people live. They bring a great deal of convenience and enjoyment to us. Undoubtedly, we have become more and more dependent on these wireless technologies. These include cellular and radio frequency identification (RFID) technologies. However, with great technologies also come great risks and threats. Unlike wired transmissions, the nature of wireless transmissions result in the transmitted signals over the channel can be easily intercepted and eavesdropped by malicious adversaries. Therefore, security and privacy of the employed wireless communication system are easily compromised compared to the wired communication system. Consequently, securing wireless network has attracted a lot of attention in the recent years and it has huge practical implications. Securing wireless networks can be and indeed are performed at all layers of a network protocol stack. These include application, network, data link and physical (PHY) layers. The primary focus of our research is on the PHY layer approaches for securing and attacking wireless networks. In this thesis, we identify three research topics and present our results. They are: 1) PHY layer phase encryption (P-Enc) vs XOR encryption (XOR-Enc); 2) PHY layer signaling scheme to ensure the confidentiality of the transmitted messages from the tag to the reader in RFID systems. 3) Active eavesdropping attack framework under frequency hopping spread spectrum (FHSS) RFID systems. In the first work, we introduce a new OFDM encryption scheme which we call OFDM-Enc, different from convectional XOR-Enc, OFDM-Enc encrypts data by multiplying each of in-phase and quadrature component of the time domain OFDM symbol by a keystream bit. We then perform an initial investigation on the security of OFDM-Enc. We show it is secure against all attacks that are considered in this work. Moreover, depending on the modulation type, OFDM would potentially reduce the keystream size required for encryption, while still achieving the required security level. We also conduct simulations to compare OFDM-Enc with conventional XOR-Enc. We show indeed OFDM-Enc is viable and can achieve good performances. Then we extend OFDM-Enc to general communication systems. Since the encryption is essentially done by changing the phase of the data constellations, we just adopt the term P-Enc. In addition, we form mathematical formulations in order to compare between P-Enc and XOR-Enc in terms of efficiency, security and hardware complexity. Furthermore, we show P-Enc at the PHY layer can prevent traffic analysis attack, which cannot be prevented with the upper layer encryptions. Finally, simulations are conducted again to compare the performance of P-Enc and XOR-Enc. In the second work, we are interested in protecting tag's data from leaking or being compromised to malicious adversaries. As discussed earlier, due to the nature of wireless channels, communications between the tag and the reader is susceptible to eavesdropping. The conventional method uses encryption for confidentiality protection of transmitted messages. However, this requires to pre-share keys between the reader and the tag. As a result, a key management and distribution system needs to be put in place. This introduces heavy system overhead. In this work, we first propose a new PHY layer RFID privacy protection method which requires no pre-shared keys and would achieve the same goal. We also perform theoretical analysis to first validate of our proposed scheme. Finally, we conduct experiments to further verify the feasibility our proposed scheme under the passive eavesdropping attack model. In the third work, we present a new attack on the FHSS RFID system called active eavesdropping attack. In most semi-passive and passive RFID systems, tag to reader communications are accomplished via backscattering modulation. This implies the tag is not required to identify the frequency of the legitimate reader's transmitted signal, it simply responds to a reader's query by setting its impedance in the circuitry to low and high to represent bit 1 and 0. The attacker exploits this design weakness of the tag and broadcasts his own continuous wave (CW) at a different frequency. Consequently, the eavesdropper receives two copies of responses: one from his own broadcasted CW and one from reader's CW. We perform theoretical analysis to show the optimal strategy for the attacker in terms of the decoding error probability. Finally, we conduct simulations and experiments to verify with our theoretical results

    Reinforcement Learning

    Get PDF
    Brains rule the world, and brain-like computation is increasingly used in computers and electronic devices. Brain-like computation is about processing and interpreting data or directly putting forward and performing actions. Learning is a very important aspect. This book is on reinforcement learning which involves performing actions to achieve a goal. The first 11 chapters of this book describe and extend the scope of reinforcement learning. The remaining 11 chapters show that there is already wide usage in numerous fields. Reinforcement learning can tackle control tasks that are too complex for traditional, hand-designed, non-learning controllers. As learning computers can deal with technical complexities, the tasks of human operators remain to specify goals on increasingly higher levels. This book shows that reinforcement learning is a very dynamic area in terms of theory and applications and it shall stimulate and encourage new research in this field

    The CMS experiment at the CERN LHC

    Get PDF
    The Compact Muon Solenoid (CMS) detector is described. The detector operates at the Large Hadron Collider (LHC) at CERN. It was conceived to study proton-proton (and leadlead) collisions at a centre-of-mass energy of 14 TeV (5.5 TeV nucleon-nucleon) and at luminosities up to 1034 cm-2s-1 (1027 cm-2s-1). At the core of the CMS detector sits a high-magnetic field and large-bore superconducting solenoid surrounding an all-silicon pixel and strip tracker, a lead-tungstate scintillating-crystals electromagnetic calorimeter, and a brass-scintillator sampling hadron calorimeter. The iron yoke of the flux-return is instrumented with four stations of muon detectors covering most of the 4π solid angle. Forward sampling calorimeters extend the pseudorapidity coverage to high values (|η| ≤ 5) assuring very good hermeticity. The overall dimensions of the CMS detector are a length of 21.6 m, a diameter of 14.6 m and a total weight of 12500 t

    Abstracts on Radio Direction Finding (1899 - 1995)

    Get PDF
    The files on this record represent the various databases that originally composed the CD-ROM issue of "Abstracts on Radio Direction Finding" database, which is now part of the Dudley Knox Library's Abstracts and Selected Full Text Documents on Radio Direction Finding (1899 - 1995) Collection. (See Calhoun record https://calhoun.nps.edu/handle/10945/57364 for further information on this collection and the bibliography). Due to issues of technological obsolescence preventing current and future audiences from accessing the bibliography, DKL exported and converted into the three files on this record the various databases contained in the CD-ROM. The contents of these files are: 1) RDFA_CompleteBibliography_xls.zip [RDFA_CompleteBibliography.xls: Metadata for the complete bibliography, in Excel 97-2003 Workbook format; RDFA_Glossary.xls: Glossary of terms, in Excel 97-2003 Workbookformat; RDFA_Biographies.xls: Biographies of leading figures, in Excel 97-2003 Workbook format]; 2) RDFA_CompleteBibliography_csv.zip [RDFA_CompleteBibliography.TXT: Metadata for the complete bibliography, in CSV format; RDFA_Glossary.TXT: Glossary of terms, in CSV format; RDFA_Biographies.TXT: Biographies of leading figures, in CSV format]; 3) RDFA_CompleteBibliography.pdf: A human readable display of the bibliographic data, as a means of double-checking any possible deviations due to conversion
    • …
    corecore