2,122 research outputs found
Wideband cyclostationary spectrum sensing and characterization for cognitive radios
Motivated by the spectrum scarcity problem, Cognitive Radios (CRs) have been proposed as a solution to opportunistically communicate over unused spectrum licensed to Primary users (PUs). In this context, the unlicensed Secondary users (SUs) sense the spectrum to detect the presence or absence of PUs, and use the unoccupied bands without causing interference to PUs. CRs are equipped with capabilities such as, learning, adaptability, and recongurability, and are spectrum aware. Spectrum awareness comes from spectrum sensing, and it can be performed using different techniques
Future Intelligent Data link and Unit-Level Combat System Based on Global Combat Cloud
The development of U.S. Army and NATO data link systems is introduced first,
and then the development trend of future intelligent data link is summarized
into integration, generalization, multifunctionality and high security. A
unit-level combat system architecture based on the global combat cloud, which
is capable of realizing the flexible scheduling of global combat resources and
maximizing the overall combat effectiveness, is proposed. Intelligent data link
is an important part of this solution, providing strong information support for
future urban unit-level warfare
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
Satellite-based Communication systems are gaining renewed momentum in
Industry and Academia, thanks to innovative services introduced by leading tech
companies and the promising impact they can deliver towards the global
connectivity objective tackled by early 6G initiatives. On the one hand, the
emergence of new manufacturing processes and radio technologies promises to
reduce service costs while guaranteeing outstanding communication latency,
available bandwidth, flexibility, and coverage range. On the other hand,
cybersecurity techniques and solutions applied in SATCOM links should be
updated to reflect the substantial advancements in attacker capabilities
characterizing the last two decades. However, business urgency and
opportunities are leading operators towards challenging system trade-offs,
resulting in an increased attack surface and a general relaxation of the
available security services. In this paper, we tackle the cited problems and
present a comprehensive survey on the link-layer security threats, solutions,
and challenges faced when deploying and operating SATCOM systems.Specifically,
we classify the literature on security for SATCOM systems into two main
branches, i.e., physical-layer security and cryptography schemes.Then, we
further identify specific research domains for each of the identified branches,
focusing on dedicated security issues, including, e.g., physical-layer
confidentiality, anti-jamming schemes, anti-spoofing strategies, and
quantum-based key distribution schemes. For each of the above domains, we
highlight the most essential techniques, peculiarities, advantages,
disadvantages, lessons learned, and future directions.Finally, we also identify
emerging research topics whose additional investigation by Academia and
Industry could further attract researchers and investors, ultimately unleashing
the full potential behind ubiquitous satellite communications.Comment: 72 page
Satellite-based communications security:A survey of threats, solutions, and research challenges
Satellite-based Communication (SATCOM) systems are gaining renewed momentum in Industry and Academia, thanks to innovative services introduced by leading tech companies and the promising impact they can deliver towards the global connectivity objective tackled by early 6G initiatives. On the one hand, the emergence of new manufacturing processes and radio technologies promises to reduce service costs while guaranteeing outstanding communication latency, available bandwidth, flexibility, and coverage range. On the other hand, cybersecurity techniques and solutions applied in SATCOM links should be updated to reflect the substantial advancements in attacker capabilities characterizing the last two decades. However, business urgency and opportunities are leading operators towards challenging system trade-offs, resulting in an increased attack surface and a general relaxation of the available security services. In this paper, we tackle the cited problems and present a comprehensive survey on the link-layer security threats, solutions, and challenges faced when deploying and operating SATCOM systems. Specifically, we classify the literature on security for SATCOM systems into two main branches, i.e., physical-layer security and cryptography schemes. Then, we further identify specific research domains for each of the identified branches, focusing on dedicated security issues, including, e.g., physical-layer confidentiality, anti-jamming schemes, anti-spoofing strategies, and quantum-based key distribution schemes. For each of the above domains, we highlight the most essential techniques, peculiarities, advantages, disadvantages, lessons learned, and future directions. Finally, we also identify emerging research topics whose additional investigation by Academia and Industry could further attract researchers and investors, ultimately unleashing the full potential behind ubiquitous satellite communications.</p
Joint beamforming design for secure RIS-assisted IoT networks
This paper studies secure communication in an internet-of-things (IoT) network, where the confidential signal is sent by an active refracting reconfigurable intelligent surface (RIS)-based transmitter, and a passive reflective RIS is utilized to improve the secrecy performance of users in the presence of multiple eavesdroppers. Specifically, we aim to maximize the weighted sum secrecy rate by jointly designing the power allocation, transmit beamforming (BF) of the refracting RIS, and the phase shifts of the reflective RIS. To solve the non-convex optimization problem, we propose a linearization method to approximate the objective function into a linear form. Then, an alternating optimization (AO) scheme is proposed to jointly optimize the power allocation factors, BF vector and phase shifts, where the first one is found using the Lagrange dual method, while the latter two are obtained by utilizing the penalty dual decomposition method. Moreover, considering the demands of green and secure communications, by applying the Dinkelbach’s method, we extend our proposed scheme to solving a secrecy energy maximization problem. Finally, simulation results demonstrate the effectiveness of the proposed design
- …