6,823 research outputs found

    Detection of replay attacks in cyber-physical systems using a frequency-based signature

    Get PDF
    This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop system and checks whether the time profile of the frequency components in the output signal are compatible with the authentication signal or not. In order to carry out this target, the couplings between inputs and outputs are eliminated using a dynamic decoupling technique based on vector fitting. In this way, a signature introduced on a specific input channel will affect only the output that is selected to be associated with that input, which is a property that can be exploited to determine which channels are being affected. A bank of band-pass filters is used to generate signals whose energies can be compared to reconstruct an estimation of the time-varying frequency profile. By matching the known frequency profile with its estimation, the detector can provide the information about whether a replay attack is being carried out or not. The design of the signal generator and the detector are thoroughly discussed, and an example based on a quadruple-tank process is used to show the application and effectiveness of the proposed method.Peer ReviewedPostprint (author's final draft

    Multi-service Signal Multiplexing and Isolation for Physical-Layer Network Slicing (PNS)

    Get PDF
    Network slicing has been identified as one of the most important features for 5G and beyond to enable operators to utilize networks on an as-a-service basis and meet the wide range of use cases. In physical layer, the frequency and time resources are split into slices to cater for the services with individual optimal designs, resulting in services/slices having different baseband numerologies (e.g., subcarrier spacing) and / or radio frequency (RF) front-end configurations. In such a system, the multi-service signal multiplexing and isolation among the service/slices are critical for the Physical-Layer Network Slicing (PNS) since orthogonality is destroyed and significant inter-service/ slice-band-interference (ISBI) may be generated. In this paper, we first categorize four PNS cases according to the baseband and RF configurations among the slices. The system model is established by considering a low out of band emission (OoBE) waveform operating in the service/slice frequency band to mitigate the ISBI. The desired signal and interference for the two slices are derived. Consequently, one-tap channel equalization algorithms are proposed based on the derived model. The developed system models establish a framework for further interference analysis, ISBI cancelation algorithms, system design and parameter selection (e.g., guard band), to enable spectrum efficient network slicing

    Probabilistic Rateless Multiple Access for Machine-to-Machine Communication

    Get PDF
    Future machine to machine (M2M) communications need to support a massive number of devices communicating with each other with little or no human intervention. Random access techniques were originally proposed to enable M2M multiple access, but suffer from severe congestion and access delay in an M2M system with a large number of devices. In this paper, we propose a novel multiple access scheme for M2M communications based on the capacity-approaching analog fountain code to efficiently minimize the access delay and satisfy the delay requirement for each device. This is achieved by allowing M2M devices to transmit at the same time on the same channel in an optimal probabilistic manner based on their individual delay requirements. Simulation results show that the proposed scheme achieves a near optimal rate performance and at the same time guarantees the delay requirements of the devices. We further propose a simple random access strategy and characterized the required overhead. Simulation results show the proposed approach significantly outperforms the existing random access schemes currently used in long term evolution advanced (LTE-A) standard in terms of the access delay.Comment: Accepted to Publish in IEEE Transactions on Wireless Communication

    SGD Frequency-Domain Space-Frequency Semiblind Multiuser Receiver with an Adaptive Optimal Mixing Parameter

    Get PDF
    A novel stochastic gradient descent frequency-domain (FD) space-frequency (SF) semiblind multiuser receiver with an adaptive optimal mixing parameter is proposed to improve performance of FD semiblind multiuser receivers with a fixed mixing parameters and reduces computational complexity of suboptimal FD semiblind multiuser receivers in SFBC downlink MIMO MC-CDMA systems where various numbers of users exist. The receiver exploits an adaptive mixing parameter to mix information ratio between the training-based mode and the blind-based mode. Analytical results prove that the optimal mixing parameter value relies on power and number of active loaded users existing in the system. Computer simulation results show that when the mixing parameter is adapted closely to the optimal mixing parameter value, the performance of the receiver outperforms existing FD SF adaptive step-size (AS) LMS semiblind based with a fixed mixing parameter and conventional FD SF AS-LMS training-based multiuser receivers in the MSE, SER and signal to interference plus noise ratio in both static and dynamic environments

    Improving Third-Party Relaying for LTE-A: A Realistic Simulation Approach

    Full text link
    In this article we propose solutions to diverse conflicts that result from the deployment of the (still immature) relay node (RN) technology in LTE-A networks. These conflicts and their possible solutions have been observed by implementing standard-compliant relay functionalities on the Vienna simulator. As an original experimental approach, we model realistic RN operation, taking into account that transmitters are not active all the time due to half-duplex RN operation. We have rearranged existing elements in the simulator in a manner that emulates RN behavior, rather than implementing a standalone brand-new component for the simulator. We also study analytically some of the issues observed in the interaction between the network and the RNs, to draw conclusions beyond simulation observation. The main observations of this paper are that: ii) Additional time-varying interference management steps are needed, because the LTE-A standard employs a fixed time division between eNB-RN and RN-UE transmissions (typical relay capacity or throughput research models balance them optimally, which is unrealistic nowadays); iiii) There is a trade-off between the time-division constraints of relaying and multi-user diversity; the stricter the constraints on relay scheduling are, the less flexibility schedulers have to exploit channel variation; and iiiiii) Thee standard contains a variety of parameters for relaying configuration, but not all cases of interest are covered.Comment: 17 one-column pages, 9 figures, accepted for publication in IEEE ICC 2014 MW
    • …
    corecore