6,823 research outputs found
Detection of replay attacks in cyber-physical systems using a frequency-based signature
This paper proposes a frequency-based approach for the detection of replay attacks affecting cyber-physical systems (CPS). In particular, the method employs a sinusoidal signal with a time-varying frequency (authentication signal) into the closed-loop system and checks whether the time profile of the frequency components in the output signal are compatible with the authentication signal or not. In order to carry out this target, the couplings between inputs and outputs are eliminated using a dynamic decoupling technique based on vector fitting. In this way, a signature introduced on a specific input channel will affect only the output that is selected to be associated with that input, which is a property that can be exploited to determine which channels are being affected. A bank of band-pass filters is used to generate signals whose energies can be compared to reconstruct an estimation of the time-varying frequency profile. By matching the known frequency profile with its estimation, the detector can provide the information about whether a replay attack is being carried out or not. The design of the signal generator and the detector are thoroughly discussed, and an example based on a quadruple-tank process is used to show the application and effectiveness of the proposed method.Peer ReviewedPostprint (author's final draft
Multi-service Signal Multiplexing and Isolation for Physical-Layer Network Slicing (PNS)
Network slicing has been identified as one of the most important features for 5G and beyond to enable operators to utilize networks on an as-a-service basis and meet the wide range of use cases. In physical layer, the frequency and time resources are split into slices to cater for the services with individual optimal designs, resulting in services/slices having different baseband numerologies (e.g., subcarrier spacing) and / or radio frequency (RF) front-end configurations. In such a system, the multi-service signal multiplexing and isolation among the service/slices are critical for the Physical-Layer Network Slicing (PNS) since orthogonality is destroyed and significant inter-service/ slice-band-interference (ISBI) may be generated. In this paper, we first categorize four PNS cases according to the baseband and RF configurations among the slices. The system model is established by considering a low out of band emission (OoBE) waveform operating in the service/slice frequency band to mitigate the ISBI. The desired signal and interference for the two slices are derived. Consequently, one-tap channel equalization algorithms are proposed based on the derived model. The developed system models establish a framework for further interference analysis, ISBI cancelation algorithms, system design and parameter selection (e.g., guard band), to enable spectrum efficient network slicing
Probabilistic Rateless Multiple Access for Machine-to-Machine Communication
Future machine to machine (M2M) communications need to support a massive
number of devices communicating with each other with little or no human
intervention. Random access techniques were originally proposed to enable M2M
multiple access, but suffer from severe congestion and access delay in an M2M
system with a large number of devices. In this paper, we propose a novel
multiple access scheme for M2M communications based on the capacity-approaching
analog fountain code to efficiently minimize the access delay and satisfy the
delay requirement for each device. This is achieved by allowing M2M devices to
transmit at the same time on the same channel in an optimal probabilistic
manner based on their individual delay requirements. Simulation results show
that the proposed scheme achieves a near optimal rate performance and at the
same time guarantees the delay requirements of the devices. We further propose
a simple random access strategy and characterized the required overhead.
Simulation results show the proposed approach significantly outperforms the
existing random access schemes currently used in long term evolution advanced
(LTE-A) standard in terms of the access delay.Comment: Accepted to Publish in IEEE Transactions on Wireless Communication
SGD Frequency-Domain Space-Frequency Semiblind Multiuser Receiver with an Adaptive Optimal Mixing Parameter
A novel stochastic gradient descent frequency-domain (FD) space-frequency (SF) semiblind multiuser receiver with an adaptive optimal mixing parameter is proposed to improve performance of FD semiblind multiuser receivers with a fixed mixing parameters and reduces computational complexity of suboptimal FD semiblind multiuser receivers in SFBC downlink MIMO MC-CDMA systems where various numbers of users exist. The receiver exploits an adaptive mixing parameter to mix information ratio between the training-based mode and the blind-based mode. Analytical results prove that the optimal mixing parameter value relies on power and number of active loaded users existing in the system. Computer simulation results show that when the mixing parameter is adapted closely to the optimal mixing parameter value, the performance of the receiver outperforms existing FD SF adaptive step-size (AS) LMS semiblind based with a fixed mixing parameter and conventional FD SF AS-LMS training-based multiuser receivers in the MSE, SER and signal to interference plus noise ratio in both static and dynamic environments
Improving Third-Party Relaying for LTE-A: A Realistic Simulation Approach
In this article we propose solutions to diverse conflicts that result from
the deployment of the (still immature) relay node (RN) technology in LTE-A
networks. These conflicts and their possible solutions have been observed by
implementing standard-compliant relay functionalities on the Vienna simulator.
As an original experimental approach, we model realistic RN operation, taking
into account that transmitters are not active all the time due to half-duplex
RN operation. We have rearranged existing elements in the simulator in a manner
that emulates RN behavior, rather than implementing a standalone brand-new
component for the simulator. We also study analytically some of the issues
observed in the interaction between the network and the RNs, to draw
conclusions beyond simulation observation.
The main observations of this paper are that: ) Additional time-varying
interference management steps are needed, because the LTE-A standard employs a
fixed time division between eNB-RN and RN-UE transmissions (typical relay
capacity or throughput research models balance them optimally, which is
unrealistic nowadays); ) There is a trade-off between the time-division
constraints of relaying and multi-user diversity; the stricter the constraints
on relay scheduling are, the less flexibility schedulers have to exploit
channel variation; and ) Thee standard contains a variety of parameters
for relaying configuration, but not all cases of interest are covered.Comment: 17 one-column pages, 9 figures, accepted for publication in IEEE ICC
2014 MW
- …