453 research outputs found

    Blind source separation for interference cancellation in CDMA systems

    Get PDF
    Communication is the science of "reliable" transfer of information between two parties, in the sense that the information reaches the intended party with as few errors as possible. Modern wireless systems have many interfering sources that hinder reliable communication. The performance of receivers severely deteriorates in the presence of unknown or unaccounted interference. The goal of a receiver is then to combat these sources of interference in a robust manner while trying to optimize the trade-off between gain and computational complexity. Conventional methods mitigate these sources of interference by taking into account all available information and at times seeking additional information e.g., channel characteristics, direction of arrival, etc. This usually costs bandwidth. This thesis examines the issue of developing mitigating algorithms that utilize as little as possible or no prior information about the nature of the interference. These methods are either semi-blind, in the former case, or blind in the latter case. Blind source separation (BSS) involves solving a source separation problem with very little prior information. A popular framework for solving the BSS problem is independent component analysis (ICA). This thesis combines techniques of ICA with conventional signal detection to cancel out unaccounted sources of interference. Combining an ICA element to standard techniques enables a robust and computationally efficient structure. This thesis proposes switching techniques based on BSS/ICA effectively to combat interference. Additionally, a structure based on a generalized framework termed as denoising source separation (DSS) is presented. In cases where more information is known about the nature of interference, it is natural to incorporate this knowledge in the separation process, so finally this thesis looks at the issue of using some prior knowledge in these techniques. In the simple case, the advantage of using priors should at least lead to faster algorithms.reviewe

    Radio frequency interference detection and mitigation techniques for navigation and Earth observation

    Get PDF
    Radio-Frequency Interference (RFI) signals are undesired signals that degrade or disrupt the performance of a wireless receiver. RFI signals can be troublesome for any receiver, but they are especially threatening for applications that use very low power signals. This is the case of applications that rely on the Global Navigation Satellite Systems (GNSS), or passive microwave remote sensing applications such as Microwave Radiometry (MWR) and GNSS-Reflectometry (GNSS-R). In order to solve the problem of RFI, RFI-countermeasures are under development. This PhD thesis is devoted to the design, implementation and test of innovative RFI-countermeasures in the fields of MWR and GNSS. In the part devoted to RFI-countermeasures for MWR applications, first, this PhD thesis completes the development of the MERITXELL instrument. The MERITXELL is a multi-frequency total-power radiometer conceived to be an outstanding platform to perform detection, characterization, and localization of RFI signals at the most common MWR imaging bands up to 92 GHz. Moreover, a novel RFI mitigation technique is proposed for MWR: the Multiresolution Fourier Transform (MFT). An assessment of the performance of the MFT has been carried out by comparison with other time-frequency mitigation techniques. According to the results, the MFT technique is a good trade-off solution among all other techniques since it can mitigate efficiently all kinds of RFI signals under evaluation. In the part devoted to RFI-countermeasures for GNSS and GNSS-R applications, first, a system for RFI detection and localization at GNSS bands is proposed. This system is able to detect RFI signals at the L1 band with a sensitivity of -108 dBm at full-band, and of -135 dBm for continuous wave and chirp-like signals when using the averaged spectrum technique. Besides, the Generalized Spectral Separation Coefficient (GSSC) is proposed as a figure of merit to evaluate the Signal-to-Noise Ratio (SNR) degradation in the Delay-Doppler Maps (DDMs) due to the external RFI effect. Furthermore, the FENIX system has been conceived as an innovative system for RFI detection and mitigation and anti-jamming for GNSS and GNSS-R applications. FENIX uses the MFT blanking as a pre-correlation excision tool to perform the mitigation. In addition, FENIX has been designed to be cross-GNSS compatible and RFI-independent. The principles of operation of the MFT blanking algorithm are assessed and compared with other techniques for GNSS signals. Its performance as a mitigation tool is proven using GNSS-R data samples from a real airborne campaign. After that, the main building blocks of the patented architecture of FENIX have been described. The FENIX architecture has been implemented in three real-time prototypes. Moreover, a simulator named FENIX-Sim allows for testing its performance under different jamming scenarios. The real-time performance of FENIX prototype has been tested using different setups. First, a customized VNA has been built in order to measure the transfer function of FENIX in the presence of several representative RFI/jamming signals. The results show how the power transfer function adapts itself to mitigate the RFI/jamming signal. Moreover, several real-time tests with GNSS receivers have been performed using GPS L1 C/A, GPS L2C, and Galileo E1OS. The results show that FENIX provides an extra resilience against RFI and jamming signals up to 30 dB. Furthermore, FENIX is tested using a real GNSS timing setup. Under nominal conditions, when no RFI/jamming signal is present, a small additional jitter on the order of 2-4 ns is introduced in the system. Besides, a maximum bias of 45 ns has been measured under strong jamming conditions (-30 dBm), which is acceptable for current timing systems requiring accuracy levels of 100 ns. Finally, the design of a backup system for GNSS in tracking applications that require high reliability against RFI and jamming attacks is proposed.Les interferències de radiofreqüència (RFI) són senyals no desitjades que degraden o interrompen el funcionament dels receptors sense fils. Les RFI poden suposar un problema per qualsevol receptor, però són especialment amenaçadores per les a aplicacions que fan servir senyals de molt baixa potència. Aquest és el cas de les aplicacions que depenen dels sistemes mundials de navegació per satèl·lit (GNSS) o de les aplicacions de teledetecció passiva de microones, com la radiometria de microones (MWR) i la reflectometria GNSS (GNSS-R). Per combatre aquest problema, sistemes anti-RFI s'estan desenvolupament actualment. Aquesta tesi doctoral està dedicada al disseny, la implementació i el test de sistemes anti-RFI innovadors en els camps de MWR i GNSS. A la part dedicada als sistemes anti-RFI en MWR, aquesta tesi doctoral completa el desenvolupament de l'instrument MERITXELL. El MERITXELL és un radiòmetre multifreqüència concebut com una plataforma excepcional per la detecció, caracterització i localització de RFI a les bandes de MWR més utilitzades per sota dels 92 GHz. A més a més, es proposa una nova tècnica de mitigació de RFI per MWR: la Transformada de Fourier amb Multiresolució (MFT). El funcionament de la MFT s'ha comparat amb el d'altres tècniques de mitigació en els dominis del temps i la freqüència. D'acord amb els resultats obtinguts, la MFT és una bona solució de compromís entre les altres tècniques, ja que pot mitigar de manera eficient tots els tipus de senyals RFI considerats. A la part dedicada als sistemes anti-RFI en GNSS i GNSS-R, primer es proposa un sistema per a la detecció i localització de RFI a les bandes GNSS. Aquest sistema és capaç de detectar senyals RFI a la banda L1 amb una sensibilitat de -108 dBm a tota la banda, i de -135 dBm per a senyals d'ona contínua i chirp fen un mitjana de l'espectre. A més a més, el Coeficient de Separació Espectral Generalitzada (GSSC) es proposa com una mesura per avaluar la degradació de la relació senyal a soroll (SNR) en els Mapes de Delay-Doppler (DDM) a causa del impacte de les RFI. La major contribució d'aquesta tesi doctoral és el sistema FENIX. FENIX és un sistema innovador de detecció i mitigació de RFI i inhibidors de freqüència per aplicacions GNSS i GNSS-R. FENIX utilitza la MFT per eliminar la interferència abans del procés de correlació amb el codi GNSS independentment del tipus de RFI. L'algoritme de mitigació de FENIX s'ha avaluat i comparat amb altres tècniques i els principals components de la seva arquitectura patentada es descriuen. Finalment, un simulador anomenat FENIX-Sim permet avaluar el seu rendiment en diferents escenaris d'interferència. El funcionament en temps real del prototip FENIX ha estat provat utilitzant diferents mètodes. En primer lloc, s'ha creat un analitzador de xarxes per a mesurar la funció de transferència del FENIX en presència de diverses RFI representatives. Els resultats mostren com la funció de transferència s'adapta per mitigar el senyal interferent. A més a més, s'han realitzat diferents proves en temps real amb receptors GNSS compatibles amb els senyals GPS L1 C/A, GPS L2C i Galileo E1OS. Els resultats mostren que FENIX proporciona una resistència addicional contra les RFI i els senyals dels inhibidors de freqüència de fins a 30 dB. A més a més, FENIX s'ha provat amb un sistema comercial de temporització basat en GNSS. En condicions nominals, sense RFI, FENIX introdueix un petit error addicional de tan sols 2-4 ns. Per contra, el biaix màxim mesurat en condicions d'alta interferència (-30 dBm) és de 45 ns, el qual és acceptable per als sistemes de temporització actuals que requereixen nivells de precisió d'uns 100 ns. Finalment, es proposa el disseny d'un sistema robust de seguiment, complementari als GNSS, per a aplicacions que requereixen alta fiabilitat contra RFI.Postprint (published version

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp

    Impacts of Anti-Access/Area Denial Measures on Space Systems: Issues and Implications for Army and Joint Forces

    Get PDF
    The 2018 National Defense Strategy and National Space Strategy both reaffirm the vital interests that the United States has in the domain of space. However, space remains an inherently hostile environment that has become congested, contested, and competitive among the nations. What are ways for the U.S. Army to assure the success of its space-dependent warfighting functions in an anti-access/area denial (A2/AD) environment where space systems are degraded for significant periods of time?https://press.armywarcollege.edu/monographs/1395/thumbnail.jp

    Satellite Power System (SPS) military applications

    Get PDF
    The potential military role, both offensive and defensive, of a Satellite Power System (SPS) is examined. A number of potential military support possibilities are described. An SPS with military capabilities may have a strong negative impact on international relations if it is not internationalized. The SPS satellite would be vulnerable to military action of an enemy with good space capability, but would experience little or no threat from saboteurs or terrorists, except via the ground controls. The paper concludes with an outline of some of the key issues involved, and a number of recommendations for future study, including some areas for long term efforts

    Timing and Carrier Synchronization in Wireless Communication Systems: A Survey and Classification of Research in the Last 5 Years

    Get PDF
    Timing and carrier synchronization is a fundamental requirement for any wireless communication system to work properly. Timing synchronization is the process by which a receiver node determines the correct instants of time at which to sample the incoming signal. Carrier synchronization is the process by which a receiver adapts the frequency and phase of its local carrier oscillator with those of the received signal. In this paper, we survey the literature over the last 5 years (2010–2014) and present a comprehensive literature review and classification of the recent research progress in achieving timing and carrier synchronization in single-input single-output (SISO), multiple-input multiple-output (MIMO), cooperative relaying, and multiuser/multicell interference networks. Considering both single-carrier and multi-carrier communication systems, we survey and categorize the timing and carrier synchronization techniques proposed for the different communication systems focusing on the system model assumptions for synchronization, the synchronization challenges, and the state-of-the-art synchronization solutions and their limitations. Finally, we envision some future research directions

    Secure and Reliable Wireless Communication through End-to-End-based Solution

    Get PDF
    In the past few decades, network architectures and protocols are often designed to achieve a high throughput and a low latency. Security was rarely considered during the initial design phases. As a result, many network systems are insecure by design. Once they are widely deployed, the inherent vulnerabilities may be difficult to eliminate due to the prohibitive update cost. In this dissertation, we examine such types of vulnerabilities in various networks and design end-to-end-based solutions that allow end systems to address such loopholes. The end-to-end argument was originally proposed to let end hosts implement application-specific functions rather than letting intermediate network nodes (i.e., routers) perform unneeded functions. In this dissertation, we apply the end-to-end principle to address three problems in wireless networks that are caused by design flaw with following reasons: either because integrating solutions into a large number of already deployed intermediate nodes is not a viable option or because end hosts are in a better position to cope with the problems. First, we study the problem of jamming in a multihop wireless network. Jamming attacks are possible because wireless networks communicate over a shared medium. It is easy to launch a jamming attack but is difficult to defend against it. To ensure the end-to-end packet delivery, we propose a jamming-resilient multipath routing algorithm that maximizes end-to-end availability based on the availability history between sources and destinations. Second, we investigate caller ID spoofing attacks in telephone networks in which an attacker can send a fake caller ID to a callee rather than her real one to impersonate as someone else. Such attacks are possible because there is no caller ID authentication mechanism in operator interconnection protocols. Modifying current protocols to verify caller ID between operators may be infeasible due to the scale of deployed systems. So, we propose two schemes to detect caller ID spoofing attacks based on end-to-end verification. Finally, we examine evil twin access point attacks in wireless hotspots. In such attacks, an adversary sets up a phishing access point that has the same Service Set IDentification (SSID) as the legitimate ones in the hotspot. Such attacks are easy to launch because of how 802.11 standards are designed. Existing solutions take away convenience from the user while providing security. Our aim is to detect evil twin access point attacks in wireless hotspots without modifying how access point works in hotspots and without additional infrastructure support. We propose an end-to-end-based mechanism that can effectively detect evil twin access point attacks in wireless hotspots
    • …
    corecore