475 research outputs found

    Space Systems: Emerging Technologies and Operations

    Get PDF
    SPACE SYSTEMS: EMERGING TECHNOLOGIES AND OPERATIONS is our seventh textbook in a series covering the world of UASs / CUAS/ UUVs. Other textbooks in our series are Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA\u27s Advanced Air Assets, 1st edition. Our previous six titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols et al., 2021) (Nichols R. K. et al., 2020) (Nichols R. et al., 2020) (Nichols R. et al., 2019) (Nichols R. K., 2018) Our seventh title takes on a new purview of Space. Let\u27s think of Space as divided into four regions. These are Planets, solar systems, the great dark void (which fall into the purview of astronomers and astrophysics), and the Dreamer Region. The earth, from a measurement standpoint, is the baseline of Space. It is the purview of geographers, engineers, scientists, politicians, and romantics. Flying high above the earth are Satellites. Military and commercial organizations govern their purview. The lowest altitude at which air resistance is low enough to permit a single complete, unpowered orbit is approximately 80 miles (125 km) above the earth\u27s surface. Normal Low Earth Orbit (LEO) satellite launches range between 99 miles (160 km) to 155 miles (250 km). Satellites in higher orbits experience less drag and can remain in Space longer in service. Geosynchronous orbit is around 22,000 miles (35,000 km). However, orbits can be even higher. UASs (Drones) have a maximum altitude of about 33,000 ft (10 km) because rotating rotors become physically limiting. (Nichols R. et al., 2019) Recreational drones fly at or below 400 ft in controlled airspace (Class B, C, D, E) and are permitted with prior authorization by using a LAANC or DroneZone. Recreational drones are permitted to fly at or below 400 ft in Class G (uncontrolled) airspace. (FAA, 2022) However, between 400 ft and 33,000 ft is in the purview of DREAMERS. In the DREAMERS region, Space has its most interesting technological emergence. We see emerging technologies and operations that may have profound effects on humanity. This is the mission our book addresses. We look at the Dreamer Region from three perspectives:1) a Military view where intelligence, jamming, spoofing, advanced materials, and hypersonics are in play; 2) the Operational Dreamer Region; whichincludes Space-based platform vulnerabilities, trash, disaster recovery management, A.I., manufacturing, and extended reality; and 3) the Humanitarian Use of Space technologies; which includes precision agriculture wildlife tracking, fire risk zone identification, and improving the global food supply and cattle management. Here’s our book’s breakdown: SECTION 1 C4ISR and Emerging Space Technologies. C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance. Four chapters address the military: Current State of Space Operations; Satellite Killers and Hypersonic Drones; Space Electronic Warfare, Jamming, Spoofing, and ECD; and the challenges of Manufacturing in Space. SECTION 2: Space Challenges and Operations covers in five chapters a wide purview of challenges that result from operations in Space, such as Exploration of Key Infrastructure Vulnerabilities from Space-Based Platforms; Trash Collection and Tracking in Space; Leveraging Space for Disaster Risk Reduction and Management; Bio-threats to Agriculture and Solutions From Space; and rounding out the lineup is a chapter on Modelling, Simulation, and Extended Reality. SECTION 3: Humanitarian Use of Space Technologies is our DREAMERS section. It introduces effective use of Drones and Precision Agriculture; and Civilian Use of Space for Environmental, Wildlife Tracking, and Fire Risk Zone Identification. SECTION 3 is our Hope for Humanity and Positive Global Change. Just think if the technologies we discuss, when put into responsible hands, could increase food production by 1-2%. How many more millions of families could have food on their tables? State-of-the-Art research by a team of fifteen SMEs is incorporated into our book. We trust you will enjoy reading it as much as we have in its writing. There is hope for the future.https://newprairiepress.org/ebooks/1047/thumbnail.jp

    Sistemas eficientes de transmissão de energia sem-fios e identificação por radiofrequência

    Get PDF
    Doutoramento em Engenharia EletrotécnicaIn the IoT context, where billions of connected objects are expected to be ubiquitously deployed worldwide, the frequent battery maintenance of ubiquitous wireless nodes is undesirable or even impossible. In these scenarios, passive-backscatter radios will certainly play a crucial role due to their low cost, low complexity and battery-free operation. However, as passive-backscatter devices are chiefly limited by the WPT link, its efficiency optimization has been a major research concern over the years, gaining even more emphasis in the IoT context. Wireless power transfer has traditionally been carried out using CW signals, and the efficiency improvement has commonly been achieved through circuit design optimization. This thesis explores a fundamentally different approach, in which the optimization is focused on the powering waveforms, rather than the circuits. It is demonstrated through theoretical analysis, simulations and measurements that, given their greater ability to overcome the built-in voltage of rectifying devices, high PAPR multi-sine (MS) signals are capable of more efficiently exciting energy harvesting circuits when compared to CWs. By using optimal MS signals to excite rectifying devices, remarkable RF-DC conversion efficiency gains of up to 15 dB with respect to CW signals were obtained. In order to show the effectiveness of this approach to improve the communication range of passive-backscatter systems, a MS front-end was integrated in a commercial RFID reader and a significant range extension of 25% was observed. Furthermore, a software-defined radio RFID reader, compliant with ISO18000-6C standard and with MS capability, was constructed from scratch. By interrogating passive RFID transponders with MS waveforms, a transponder sensitivity improvement higher than 3 dB was obtained for optimal MS signals. Since the amplification and transmission of high PAPR signals is critical, this work also proposes efficient MS transmitting architectures based on space power combining techniques. This thesis also addresses other not less important issues, namely self-jamming in passive RFID readers, which is the second limiting factor of passive-backscatter systems. A suitable self-jamming suppression scheme was first used for CW signals and then extended to MS signals, yielding a CW isolation up to 50 dB and a MS isolation up 60 dB. Finally, a battery-less remote control system was developed and integrated in a commercial TV device with the purpose of demonstrating a practical application of wireless power transfer and passive-backscatter concepts. This allowed battery-free control of four basic functionalities of the TV (CH+,CH-,VOL+,VOL-).No contexto da internet das coisas (IoT), onde são esperados bilhões de objetos conectados espalhados pelo planeta de forma ubíqua, torna-se impraticável uma frequente manutenção e troca de baterias dos dispositivos sem fios ubíquos. Nestes cenários, os sistemas radio backscatter passivos terão um papel preponderante dado o seu baixo custo, baixa complexidade e não necessidade de baterias nos nós móveis. Uma vez que a transmissão de energia sem fios é o principal aspeto limitativo nestes sistemas, a sua otimização tem sido um tema central de investigação, ganhando ainda mais ênfase no contexto IoT. Tradicionalmente, a transferência de energia sem-fios é feita através de sinais CW e a maximização da eficiência é conseguida através da otimização dos circuitos recetores. Neste trabalho explora-se uma abordagem fundamentalmente diferente, em que a otimização foca-se nas formas de onda em vez dos circuitos. Demonstra-se, teoricamente e através de simulações e medidas que, devido à sua maior capacidade em superar a barreira de potencial intrínseca dos dispositivos retificadores, os sinais multi-seno (MS) de elevado PAPR são capazes de excitar os circuitos de colheita de energia de forma mais eficiente quando comparados com o sinal CW tradicional. Usando sinais MS ótimos em circuitos retificadores, foram verificadas experimentalmente melhorias de eficiência de conversão RF-DC notáveis de até 15 dB relativamente ao sinal CW. A fim de mostrar a eficácia desta abordagem na melhoria da distância de comunicação de sistemas backscatter passivos, integrou-se um front-end MS num leitor RFID comercial e observou-se um aumento significativo de 25% na distância de leitura. Além disso, desenvolveu-se de raiz um leitor RFID baseado em software rádio, compatível com o protocolo ISO18000-6C e capaz de gerar sinais MS, com os quais interrogou-se transponders passivos, obtendo-se ganhos de sensibilidade dos transponders maiores que 3 dB. Uma vez que a amplificação de sinais de elevado PAPR é uma operação crítica, propôs-se também novas arquiteturas eficientes de transmissão baseadas na combinação de sinais em espaço livre. Esta tese aborda também outros aspetos não menos importantes, como o self-jamming em leitores RFID passivos, tido como o segundo fator limitativo neste tipo de sistemas. Estudou-se técnicas de cancelamento de self-jamming CW e estendeu-se o conceito a sinais MS, tendo-se obtido isolamentos entre o transmissor e o recetor de até 50 dB no primeiro caso e de até 60 dB no segundo. Finalmente, com o objetivo de demonstrar uma aplicação prática dos conceitos de transmissão de energia sem fios e comunicação backscatter, desenvolveu-se um sistema de controlo remoto sem pilhas, cujo protótipo foi integrado num televisor comercial a fim de controlar quatro funcionalidades básicas (CH+,CH-,VOL+,VOL-)

    DRONE DELIVERY OF CBNRECy – DEW WEAPONS Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD)

    Get PDF
    Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD) is our sixth textbook in a series covering the world of UASs and UUVs. Our textbook takes on a whole new purview for UAS / CUAS/ UUV (drones) – how they can be used to deploy Weapons of Mass Destruction and Deception against CBRNE and civilian targets of opportunity. We are concerned with the future use of these inexpensive devices and their availability to maleficent actors. Our work suggests that UASs in air and underwater UUVs will be the future of military and civilian terrorist operations. UAS / UUVs can deliver a huge punch for a low investment and minimize human casualties.https://newprairiepress.org/ebooks/1046/thumbnail.jp

    Cyber-Human Systems, Space Technologies, and Threats

    Get PDF
    CYBER-HUMAN SYSTEMS, SPACE TECHNOLOGIES, AND THREATS is our eighth textbook in a series covering the world of UASs / CUAS/ UUVs / SPACE. Other textbooks in our series are Space Systems Emerging Technologies and Operations; Drone Delivery of CBNRECy – DEW Weapons: Emerging Threats of Mini-Weapons of Mass Destruction and Disruption (WMDD); Disruptive Technologies with applications in Airline, Marine, Defense Industries; Unmanned Vehicle Systems & Operations On Air, Sea, Land; Counter Unmanned Aircraft Systems Technologies and Operations; Unmanned Aircraft Systems in the Cyber Domain: Protecting USA’s Advanced Air Assets, 2nd edition; and Unmanned Aircraft Systems (UAS) in the Cyber Domain Protecting USA’s Advanced Air Assets, 1st edition. Our previous seven titles have received considerable global recognition in the field. (Nichols & Carter, 2022) (Nichols, et al., 2021) (Nichols R. K., et al., 2020) (Nichols R. , et al., 2020) (Nichols R. , et al., 2019) (Nichols R. K., 2018) (Nichols R. K., et al., 2022)https://newprairiepress.org/ebooks/1052/thumbnail.jp

    다양한 교란 시나리오를 이용한 GNSS 수신기 성능 분석에 대한 연구

    Get PDF
    학위논문(박사)--서울대학교 대학원 :공과대학 기계항공공학부,2020. 2. 기창돈.The security and safety aspects of global navigation satellite systems have been receiving significant attention from researchers and the general public, because the use of GNSS has been increasing in modern society. In this situation, the importance of GNSS safety and security is also increasing. The most dangerous type of interference is a spoofing because if the receiver captures a spoofing signal, the navigation solution can be controlled by the spoofer. In this paper, I analyzed the characteristics of the main spoofing parameters that determines the success or failure of spoofing process when the spoofing signal is injected into the receiver. I also proposed a CCEE. It determines the spoofing result according to the various spoofing parameter. Also the correlation between spoofing parameters could be explained by estimating the boundary value and line using CCEE. In addition, spoofing success and failure could be distinguished in the spoofing parameter space using CCEE results. When the covert capture is performed at the receiver, the two correlation peaks of authentic and covert capture signals are generated on the code domain. The relative velocity (Doppler difference value) of the two signal peaks determines the time of total spoofing process. In general, the timing at which the DLL tracking lock point is switched from the authentic signal to the spoofing signal is different according to the visible satellite. This raises the value of WSSE. In order to minimize this, the spoofing should be performed in a short time by determining the optimal sweep direction. In a 3D situation, triangles are defined using a particular visible satellites, and the circumcenter direction of the triangle on the victim becomes the optimal direction, and the relative speed of the authentic and the covert capture signal for the visible satellite be maximized on the optimal covert capture direction. To simulate the proposed methods, we defined the covet capture scenarios and generated the IF data to simulate the intended scenarios. Then, using the corresponding IF data, signal processing was performed through SDR. Through this, it was confirmed that the spoofing is successfully performed as intended scenarios through the optimal spoofing parameters generated through CCEE, and the covert capture process time is noticeably minimized through the optimal sweep direction.GNSS는 점점 활용범위가 확장되고 있고, 현재는 대체불가능한 시스템이 되었다. 이런 상황에서 GNSS의 안전 및 보안의 중요성 또한 크게 증가하고 있다. 본 논문에서는 GNSS의 보안에 가장 위협이 되는 기만에 대해서, 기만 신호가 수신기에 주입되었을 때 수신기의 ACF가 어떻게 변화되어 가며 기만 공격을 결정하는 주된 기만파라미터들의 특징에 대해서 분석을 진행하였다. 그리고 기만 신호에 따른 기만 결과를 결정하는 CCEE를 제안하고, 이를 통해서 기만파라미터들의 상관관계에 대해서 분석하였다. 기존에는 무수히 반복된 계산을 통해서 판단 가능한 기만 결과를 CCEE를 통해 한번의 계산으로 결과를 확인하도록 하였다. 또한 CCEE를 이용하여 경계 값과 경계 라인을 정의함으로써, 기만파라미터 공간에서 기만 성공과 실패를 구분할 수 있음이 확인되었다. 수신기에서 기만이 수행될 때, 코드도메인상에서 replica와 cross correlation에 의한 원신호와 기만신호 각각의 correlation peak가 생성된다. 두 신호 peak의 상대속도가 기만이 수행되는 시간을 결정한다. 일반적으로 기만이 수행되는 동안, 각 채널간 DLL tracking lock 지점이 원신호에서 기만신호로 전환되는 시점이 다르다. 이로 인해서 WSSE의 값이 상승하게 된다. 이를 최소화하기 위해서, 최적 기만 sweep 방향을 결정함으로써 빠른 시간에 기만을 수행할 수 있음을 확인하였다. 3D 상황에서 특정 가시위성를 이용하여 삼각형을 정의하고, 해당 삼각형의 외심 방향이 최적 방향이 되며, 해당 방향이 기만 수행이 가장 늦게 되는 가시위성에 대한 원신호와 기만신호의 상대속도가 최대가 되는 방향임을 확인하였다. 제안된 방법들을 모사하기 위해서, 기만시나리오를 정의하고, 해당 기만시나리오를 모사하는 IF data를 생성하였다. 그리고, 해당 IF data를 이용하여, SDR을 통해서 신호 처리를 진행하였다. 이를 통해, CCEE를 적용하여 생성한 최적 기만파라미터로 기만이 의도된 데로 수행이 되며, optimal 방향을 통해 기만수행시간이 최소화 됨을 확인하였다.Chapter 1. Introduction 1 1.1. Research Motivation 1 1.2. Related research 2 1.3. Outline of the Dissertation 4 1.4. Contributions 5 Chapter 2. Background 7 2.1. GPS receiver fundamental 7 2.1.1. GPS signal structure 7 2.1.2. Signal processing structure of GPS receiver 9 2.1.3. Signal acquisition 10 2.1.4. Signal tracking 11 2.1.5. Navigation Message Decoding 14 2.1.6. Pseudorange model and range calculation 16 2.2. GNSS interferences and attack strategies 19 2.2.1. Types of GNSS interferences 19 2.2.2. Interference attack strategies 21 Chapter 3. Covert Capture Effectiveness Equation 26 3.1. Authentic and spoofing signal ACF model 26 3.2. Spoofing scenario simulation using ACF model 30 3.3. Development of spoofing process equation 33 3.3.1. conventional approach for tau calculation 33 3.3.2. proposed approach for τ calculation 34 3.3.3. Spoofing attack success or failure criteria 37 3.3.4. Derivation of SPE 44 3.4. Analysis of CCEE simulation results 49 3.4.1. CCEE performance analysis 49 3.4.2. Determination of boundary line and surface using SPE 53 Chapter 4. Optimal sweep direction of covert capture signal 58 4.1. Maximum Doppler difference value 58 4.2. Optimal covert capture direction in 2D case 62 4.3. Optimal covert capture direction in 3D case 68 4.4. Optimal covert capture direction using optimization method 71 Chapter 5. Covert capture simulation using software defined receiver 73 5.1. Implementation of GNSS measurement and IF data generation simulator 73 5.1.1. Pseudorange model 73 5.1.2. Simulator structure 74 5.1.3. Signal amplitude calculation in spoofing scenario 75 5.2. CCEE simulation in SDR 81 5.2.1. Compensation value calculation for covert capture 84 5.2.2. Compensation value calculation for covert capture 85 5.3. Optimal covert capture direction simulation in SDR 92 Chapter 6. Changing the user's trajectory using covert capture signal 95 Chapter 7. Conclusions and future works 102 7.1. Conclusions 102 7.2. Future works 103 Capture 8. Reference 104Docto

    Virtual SATCOM, Long Range Broadband Digital Communications

    Get PDF
    The current naval strategy is based on a distributed force, networked together with high-speed communications that enable operations as an intelligent, fast maneuvering force. Satellites, the existing network connector, are weak and vulnerable to attack. HF is an alternative, but it does not have the information throughput to meet the distributed warfighting need. The US Navy does not have a solution to reduce dependency on space-based communication systems while providing the warfighter with the required information speed. Virtual SATCOM is a solution that can match satellite communications (SATCOM) data speed without the vulnerable satellite. It is wireless communication on a High Frequency (HF) channel at SATCOM speed. We have developed an innovative design using high power and gain, ground-based relay systems. We transmit extremely wide-wideband HF channels from ground stations using large directional antennas. Our system starts with a highly directional antenna with a narrow beam that enables increased bandwidth without interfering with other spectrum users. The beam focus and power provide a high SNR across a wideband channel with data rates of 10 Mbps; 1000 times increase in HF data speed. Our modeling of the ionosphere shows that the ionosphere has more than adequate bandwidth to communicate at 3000 km and high speeds while avoiding detection. We designed a flexible structure adjustable to the dynamic ionosphere. Our design provides a high-speed communications path without the geo-location vulnerability of legacy HF methods. Our invention will benefit mobile users using steerable beam forming apertures with wide bandwidth signals. This dissertation will focus on three areas: an examination of the ionosphere’s ability to support the channel, design of a phased array antenna that can produce the narrow beam, and design of signal processing that can accommodate the wideband HF frequency range. Virtual SATCOM is exciting research that can reduce cost and increase access to long-range, high data rate wireless communications
    corecore