244 research outputs found

    Applications of artificial intelligence in powerline communications in terms of noise detection and reduction : a review

    Get PDF
    Abstract: The technology which utilizes the power line as a medium for transferring information known as powerline communication (PLC) has been in existence for over a hundred years. It is beneficial because it avoids new installation since it uses the present installation for electrical power to transmit data. However, transmission of data signals through a power line channel usually experience some challenges which include impulsive noise, frequency selectivity, high channel attenuation, low line impedance etc. The impulsive noise exhibits a power spectral density within the range of 10-15 dB higher than the background noise, which could cause a severe problem in a communication system. For better outcome of the PLC system, these noises must be detected and suppressed. This paper reviews various techniques used in detecting and mitigating the impulsive noise in PLC and suggests the application of machine learning algorithms for the detection and removal of impulsive noise in power line communication systems

    Cutting the last wires for mobile communications by microwave power transfer

    Get PDF
    published_or_final_versio

    JAG: Reliable and Predictable Wireless Agreement under External Radio Interference

    Get PDF
    Wireless low-power transceivers used in sensor networks typically operate in unlicensed frequency bands that are subject to external radio interference caused by devices transmitting at much higher power.communication protocols should therefore be designed to be robust against such interference. A critical building block of many protocols at all layers is agreement on a piece of information among a set of nodes. At the MAC layer, nodes may need to agree on a new time slot or frequency channel, at the application layer nodes may need to agree on handing over a leader role from one node to another. Message loss caused by interference may break agreement in two different ways: none of the nodes uses the new information (time slot, channel, leader) and sticks with the previous assignment, or-even worse-some nodes use the new information and some do not. This may lead to reduced performance or failures. In this paper, we investigate the problem of agreement under external radio interference and point out the limitations of traditional message-based approaches. We propose JAG, a novel protocol that uses jamming instead of message transmissions to make sure that two neighbouring nodes agree, and show that it outperforms message-based approaches in terms of agreement probability, energy consumption, and time-to-completion. We further show that JAG can be used to obtain performance guarantees and meet the requirements of applications with real-time constraints.CONETReSens

    Software Defined Radio Implementation Of Ds-Cdma In Inter-Satellite Communications For Small Satellites

    Get PDF
    The increased usage of CubeSats recently has changed the communication philosophy from long-range point-to-point propagations to a multi-hop network of small orbiting nodes. Separating system tasks into many dispersed satellites can increase system survivability, versatility, configurability, adaptability, and autonomy. Inter-satellite links (ISL) enable the satellites to exchange information and share resources while reducing the traffic load to the ground. Establishment and stability of the ISL are impacted by factors such as the satellite orbit and attitude, antenna configuration, constellation topology, mobility, and link range. Software Defined Radio (SDR) is beginning to be heavily used in small satellite communications for applications such as base stations. A software-defined radio is a software program that does the functionality of a hardware system. The digital signal processing blocks are incorporated into the software giving it more flexibility and modulation. With this, the idea of a remote upgrade from the ground as well as the potential to accommodate new applications and future services without hardware changes is very promising. Realizing this, my idea is to create an inter-satellite link using software defined radio. The advantages of this are higher data rates, modification of operating frequencies, possibility of reaching higher frequency bands for higher throughputs, flexible modulation, demodulation and encoding schemes, and ground modifications. However, there are several challenges in utilizing the software-defined radio to create an inter-satellite link communication for small satellites. In this paper, we designed and implemented a multi-user inter-satellite communication network using SDRs, where Code Division Multiple Access (CDMA) technique is utilized to manage the multiple accesses to shared communication channel among the satellites. This model can be easily reconfigured to support any encoding/decoding, modulation, and other signal processing schemes

    Software Defined Radio Implementation Of Ds-Cdma In Inter-Satellite Communications For Small Satellites

    Get PDF
    The increased usage of CubeSats recently has changed the communication philosophy from long-range point-to-point propagations to a multi-hop network of small orbiting nodes. Separating system tasks into many dispersed satellites can increase system survivability, versatility, configurability, adaptability, and autonomy. Inter-satellite links (ISL) enable the satellites to exchange information and share resources while reducing the traffic load to the ground. Establishment and stability of the ISL are impacted by factors such as the satellite orbit and attitude, antenna configuration, constellation topology, mobility, and link range. Software Defined Radio (SDR) is beginning to be heavily used in small satellite communications for applications such as base stations. A software-defined radio is a software program that does the functionality of a hardware system. The digital signal processing blocks are incorporated into the software giving it more flexibility and modulation. With this, the idea of a remote upgrade from the ground as well as the potential to accommodate new applications and future services without hardware changes is very promising. Realizing this, my idea is to create an inter-satellite link using software defined radio. The advantages of this are higher data rates, modification of operating frequencies, possibility of reaching higher frequency bands for higher throughputs, flexible modulation, demodulation and encoding schemes, and ground modifications. However, there are several challenges in utilizing the software-defined radio to create an inter-satellite link communication for small satellites. In this paper, we designed and implemented a multi-user inter-satellite communication network using SDRs, where Code Division Multiple Access (CDMA) technique is utilized to manage the multiple accesses to shared communication channel among the satellites. This model can be easily reconfigured to support any encoding/decoding, modulation, and other signal processing schemes

    Improved Wireless Security through Physical Layer Protocol Manipulation and Radio Frequency Fingerprinting

    Get PDF
    Wireless networks are particularly vulnerable to spoofing and route poisoning attacks due to the contested transmission medium. Traditional bit-layer defenses including encryption keys and MAC address control lists are vulnerable to extraction and identity spoofing, respectively. This dissertation explores three novel strategies to leverage the wireless physical layer to improve security in low-rate wireless personal area networks. The first, physical layer protocol manipulation, identifies true transceiver design within remote devices through analysis of replies in response to packets transmitted with modified physical layer headers. Results herein demonstrate a methodology that correctly differentiates among six IEEE 802.15.4 transceiver classes with greater than 99% accuracy, regardless of claimed bit-layer identity. The second strategy, radio frequency fingerprinting, accurately identifies the true source of every wireless transmission in a network, even among devices of the same design and manufacturer. Results suggest that even low-cost signal collection receivers can achieve greater than 90% authentication accuracy within a defense system based on radio frequency fingerprinting. The third strategy, based on received signal strength quantification, can be leveraged to rapidly locate suspicious transmission sources and to perform physical security audits of critical networks. Results herein reduce mean absolute percentage error of a widely-utilized distance estimation model 20% by examining signal strength measurements from real-world networks in a military hospital and a civilian hospital

    A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends

    Full text link
    This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state-of-the-art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. We also introduce the family of various jamming attacks and their counter-measures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201

    Exploration of Backscatter Methods for Wireless Avionics

    Get PDF
    This report describes and characterizes the low-power Jeeva Passive Radio systems, including Wanscatter (passive Chirp Spread Spectrum) and Passive Wi-Fi, with respect to their applicability to wireless avionics. The Wireless Avionics Intra-Communications (WAIC) objectives document, ITU-R M.2197, describes a number of applications of wireless avionics, and lists requirements specifications for each. Additionally, it describes models for compartments and areas of aircraft or vehicles in which wireless avionics would be applied. This exploratory study attempts to map Jeeva's Passive Radio technology to those scenarios outlined in the ITU-R M.2197 operational objectives document, and determine the areas and applications for which it is most suitable. Jeeva Passive Radio operates differently than conventional radios. In a conventional radio, a sensor-connected radio node must actively emit a signal in order to communicate. In a Jeeva Passive Radio system, that node instead simply reflects radio frequency energy which is emitted by another nearby device (called the Companion), which can be "plugged in" or otherwise has access to more power. Using reflections, a data packet can be generated and interpreted by a standard receiver. This method of communication inherently uses less energy, resulting in the potential for far lower power consumption and thus far longer battery life. Overall, 68.4% of use cases described by the ITU-R M.2197 operational objectives document were found to be addressable by Jeeva's Passive Radio systems (26 addressable of 38 total), with 26 of those best addressable by Wanscatter and three found to be best addressable with passive Wi-Fi. See Section 4.2 for a detailed breakdown of application suitability. The most fitting types of applications were in the LI (Low-rate Indoors) and LO (Low-rate Outdoors) categories, where lower rates were acceptable and thus Wanscatter could be applied and its much better uplink sensitivity leveraged. Jeeva has identified the Wanscatter (Chirp Spread Spectrum) system as likely holding the most promise for applications such as those outlined in the ITU-R M.2197 operational objectives document. We recommend that Wanscatter be a technology considered for adoption in wireless avionics

    System Architecture of Small Unmanned Aerial System for Flight beyond Visual Line-Of-Sight

    Get PDF
    Small Unmanned Aerial Systems (UAS) have increasingly been used in military application. The application in expanding scope of operations has pushed existing small UAS beyond its designed capabilities. This resulted in frequent modifications or new designs. A common requirement in modification or new design of small UAS is to operate beyond visual Line-Of-Sight (LOS) of the ground pilot. Conventional military development for small UAS adopts a design and built approach. Modification of small Remote Control (RC) aircraft, using Commercial-Off-The Shelf (COTS) equipment, offers a more economical alternative with the prospect of shorter development time compared to conventional approach. This research seeks to establish and demonstrate an architecture framework and design a prototype small UAS for operation beyond visual LOS. The aim is to achieve an effective and reliable development approach that is relevant to the military’s evolving requirements for small UASs. Key elements of the architecture include Failure Mode Effect and Criticality Analysis (FMECA), fail safe design for loss of control or communication, power management, interface definition, and configuration control to support varying onboard payloads. Flight test was conducted which successfully demonstrated a control handoff between local and remote Ground Station (GS) for beyond visual LOS operation
    • …
    corecore