323 research outputs found

    Simulation of Cognitive Electronic Warfare System With Sine and Square Waves

    Get PDF
    Today’s Electronic Warfare (EW) receivers need advanced technology to achieve real-time surveillance operations. Dynamic and intelligent systems are required for UAVs and other airborne applications. The airborne Electronic Warfare systems must be knowledge-based systems, learning from the threat scenario with highly integrated capabilities to detect, react, and adapt to radar threats in real-time. Artificial intelligence is a machine-dependent process, by adapting certain rules and logic supported by human intelligence, AI can be used for cognitive processing. Cognitive signal processing is required for making the system autonomous and dynamic in nature. Military action on radar signatures requires a set of commands to be executed dynamically with the help of the proposed EW system. It is proposed to design and develop a cognitive EW architecture and simulation of machine learning that combines neural network architecture with the help of sine and square waves as input. This paper presents the Cognitive signal processing for EW systems with Neural Network, Recurrent Neural Network (RNN), Machine learning (ML), and Deep learning (DL) techniques with their simulation with sine and square waves

    Contributions to the security of cognitive radio networks

    Get PDF
    The increasing emergence of wireless applications along with the static spectrum allocation followed by regulatory bodies has led to a high inefficiency in spectrum usage, and the lack of spectrum for new services. In this context, Cognitive Radio (CR) technology has been proposed as a possible solution to reuse the spectrum being underutilized by licensed services. CRs are intelligent devices capable of sensing the medium and identifying those portions of the spectrum being unused. Based on their current perception of the environment and on that learned from past experiences, they can optimally tune themselves with regard to parameters such as frequency, coding and modulation, among others. Due to such properties, Cognitive Radio Networks (CRNs) can act as secondary users of the spectrum left unused by their legal owners or primary users, under the requirement of not interfering primary communications. The successful deployment of these networks relies on the proper design of mechanisms in order to efficiently detect spectrum holes, adapt to changing environment conditions and manage the available spectrum. Furthermore, the need for addressing security issues is evidenced by two facts. First, as for any other type of wireless network, the air is used as communications medium and can easily be accessed by attackers. On the other hand, the particular attributes of CRNs offer new opportunities to malicious users, ranging from providing wrong information on the radio environment to disrupting the cognitive mechanisms, which could severely undermine the operation of these networks. In this Ph.D thesis we have approached the challenge of securing Cognitive Radio Networks. Because CR technology is still evolving, to achieve this goal involves not only providing countermeasures for existing attacks but also to identify new potential threats and evaluate their impact on CRNs performance. The main contributions of this thesis can be summarized as follows. First, a critical study on the State of the Art in this area is presented. A qualitative analysis of those threats to CRNs already identified in the literature is provided, and the efficacy of existing countermeasures is discussed. Based on this work, a set of guidelines are designed in order to design a detection system for the main threats to CRNs. Besides, a high level description of the components of this system is provided, being it the second contribution of this thesis. The third contribution is the proposal of a new cross-layer attack to the Transmission Control Protocol (TCP) in CRNs. An analytical model of the impact of this attack on the throughput of TCP connections is derived, and a set of countermeasures in order to detect and mitigate the effect of such attack are proposed. One of the main threats to CRNs is the Primary User Emulation (PUE) attack. This attack prevents CRNs from using available portions of the spectrum and can even lead to a Denial of Service (DoS). In the fourth contribution of this the method is proposed in order to deal with such attack. The method relies on a set of time measures provided by the members of the network and allows estimating the position of an emitter. This estimation is then used to determine the legitimacy of a given transmission and detect PUE attacks. Cooperative methods are prone to be disrupted by malicious nodes reporting false data. This problem is addressed, in the context of cooperative location, in the fifth and last contribution of this thesis. A method based on Least Median Squares (LMS) fitting is proposed in order to detect forged measures and make the location process robust to them. The efficiency and accuracy of the proposed methodologies are demonstrated by means of simulation

    Spectrum sensing for cognitive radio and radar systems

    Get PDF
    The use of the radio frequency spectrum is increasing at a rapid rate. Reliable and efficient operation in a crowded radio spectrum requires innovative solutions and techniques. Future wireless communication and radar systems should be aware of their surrounding radio environment in order to have the ability to adapt their operation to the effective situation. Spectrum sensing techniques such as detection, waveform recognition, and specific emitter identification are key sources of information for characterizing the surrounding radio environment and extracting valuable information, and consequently adjusting transceiver parameters for facilitating flexible, efficient, and reliable operation. In this thesis, spectrum sensing algorithms for cognitive radios and radar intercept receivers are proposed. Single-user and collaborative cyclostationarity-based detection algorithms are proposed: Multicycle detectors and robust nonparametric spatial sign cyclic correlation based fixed sample size and sequential detectors are proposed. Asymptotic distributions of the test statistics under the null hypothesis are established. A censoring scheme in which only informative test statistics are transmitted to the fusion center is proposed for collaborative detection. The proposed detectors and methods have the following benefits: employing cyclostationarity enables distinction among different systems, collaboration mitigates the effects of shadowing and multipath fading, using multiple strong cyclic frequencies improves the performance, robust detection provides reliable performance in heavy-tailed non-Gaussian noise, sequential detection reduces the average detection time, and censoring improves energy efficiency. In addition, a radar waveform recognition system for classifying common pulse compression waveforms is developed. The proposed supervised classification system classifies an intercepted radar pulse to one of eight different classes based on the pulse compression waveform: linear frequency modulation, Costas frequency codes, binary codes, as well as Frank, P1, P2, P3, and P4 polyphase codes. A robust M-estimation based method for radar emitter identification is proposed as well. A common modulation profile from a group of intercepted pulses is estimated and used for identifying the radar emitter. The M-estimation based approach provides robustness against preprocessing errors and deviations from the assumed noise model

    Air Force Institute of Technology Research Report 2015

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Air Force Institute of Technology Research Report 2015

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics
    • …
    corecore