2,887 research outputs found

    Space Shuttle/TDRSS communication and tracking systems analysis

    Get PDF
    In order to evaluate the technical and operational problem areas and provide a recommendation, the enhancements to the Tracking and Data Delay Satellite System (TDRSS) and Shuttle must be evaluated through simulation and analysis. These enhancement techniques must first be characterized, then modeled mathematically, and finally updated into LinCsim (analytical simulation package). The LinCsim package can then be used as an evaluation tool. Three areas of potential enhancements were identified: shuttle payload accommodations, TDRSS SSA and KSA services, and shuttle tracking system and navigation sensors. Recommendations for each area were discussed

    Low complexity physical layer security approach for 5G internet of things

    Get PDF
    Fifth-generation (5G) massive machine-type communication (mMTC) is expected to support the cellular adaptation of internet of things (IoT) applications for massive connectivity. Due to the massive access nature, IoT is prone to high interception probability and the use of conventional cryptographic techniques in these scenarios is not practical considering the limited computational capabilities of the IoT devices and their power budget. This calls for a lightweight physical layer security scheme which will provide security without much computational overhead and/or strengthen the existing security measures. Here a shift based physical layer security approach is proposed which will provide a low complexity security without much changes in baseline orthogonal frequency division multiple access (OFDMA) architecture as per the low power requirements of IoT by systematically rearranging the subcarriers. While the scheme is compatible with most fast Fourier transform (FFT) based waveform contenders which are being proposed in 5G especially in mMTC and ultra-reliable low latency communication (URLLC), it can also add an additional layer of security at physical layer to enhanced mobile broadband (eMBB)

    Secured Audio Signal Transmission in 5G Compatible mmWave Massive MIMO FBMC System with Implementation of Audio-to-image Transformation Aided Encryption Scheme

    Get PDF
    In this paper, we have made comprehensive study for the performance evaluation of mmWave massive MIMO FBMC wireless communication system. The 165F2;56 large MIMO antenna configured simulated system under investigation incorporates three modern channel coding (Turbo, LDPC and (3, 2) SPC, higher order digital modulation (256-QAM)) and various signal detection (Q-Less QR, Lattice Reduction(LR) based Zero-forcing(ZF), Lattice Reduction (LR) based ZF-SIC and Complex-valued LLL(CLLL) algorithm implemented ZF-SIC) schemes. An audio to image conversion aided chaos-based physical layer security scheme has also been implemented in such study. On considering transmission of encrypted audio signal in a hostile fading channel, it is noticeable from MATLAB based simulation study that the LDPC Channel encoded system is very much robust and effective in retrieving color image under utilization of Lattice Reduction(LR) based ZF-SIC signal detection and 16- QAM digital modulation techniques

    Power Line Communication Technologies: Modeling and Simulation of PRIME Physical Layer

    Get PDF
    Power Line Communications is a relatively new area of telecommunication. PLC employs full duplex methods for transmitting data over power lines as medium of transmission of electrical signals over a grid. PLC technologies are used in advanced meter reading, home automation and Public street lighting. Several PLC technologies classified based on the operational frequency range, are explored in this paper. PRIME is a new NBPLC system, which uses OFDM in its physical layer, for power line communication in the last mile. This work also focused on PRIME’s physical specifications, which was modeled in MATLAB/SIMULINK. In this paper, the performance of PRIME when its data is modulated using DQPSK and 4-QAM in four (4) channel models is shown.

    Security performance and protocol consideration in optical communication system with optical layer security enabled by optical coding techniques

    Get PDF
    With the fast development of communication systems, network security issues have more and more impact on daily life. It is essential to construct a high degree of optical layer security to resolve the security problem once and for all. Three different techniques which can provide optical layer security are introduced and compared. Optical chaos can be used for fast random number generation. Quantum cryptography is the most promising technique for key distribution. And the optical coding techniques can be deployed to encrypt the modulated signal in the optical layer. A mathematical equation has been derived from information theory to evaluate the information-theoretic security level of the wiretap channel in optical coding schemes. And the merits and limitation of two coherent optical coding schemes, temporal phase coding and spectral phase coding, have been analysed. The security scheme based on a reconfigurable optical coding device has been introduced, and the corresponding security protocol has been developed. By moving the encryption operation from the electronic layer to the optical layer, the modulated signals become opaque to the unauthorised users. Optical code distribution and authentication is the one of the major challenges for our proposed scheme. In our proposed protocol, both of the operations are covered and defined in detail. As a preliminary draft of the optical code security protocol, it could be a useful guidance for further research

    Quantum Cryptography in Practice

    Get PDF
    BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.Comment: Preprint of SIGCOMM 2003 pape
    corecore