78 research outputs found

    How to Model the Near-to-the-Carrier Regime and the Lower Knee Frequency of Real RF Oscillators

    Get PDF
    Numerous empirical data demonstrate that real noisy RF oscillators are affected by power-law phase noise. However, until recently, the robust analytic modeling of the deep-into-the-carrier spectral regime of RF oscillators was intangible due to the infinities involved in the relevant power-law regions. In this letter we demonstrate how recent advances in oscillator spectral modeling can be applied to extrapolate the near-to-the-carrier regime as well as estimate the oscillator lower knee frequency of transition between the deep-into-the-carrier regime and the power-law regions of real RF oscillators.</jats:p

    Helping interferer physical layer security strategies for M-QAM and M-PSK systems

    Get PDF
    Physical layer security encompasses information theoretic approaches that could guarantee perfect secrecy in wireless communication systems. In this framework, helping interferer strategies rely on intentionally creating confusion at a potential eavesdropper by injecting a jamming signal. In cases where the information signal has a Gaussian probability density function (pdf) it has been demonstrated that the optimal jamming signal, under an overall power constraint, should also be Gaussian. However, in practical communication systems where data symbols are typically drawn from discrete uniform probability mass functions (pmf), commonly M-ary Quadrature Amplitude and M-ary Phase Shift Keying modulation schemes, the structure of the optimal jamming signal is still an open question. In the present work we aim at shedding light into this question. Our approach is based on formulating a secrecy capacity maximization problem by expressing the optimal arbitrary helping interferer pdf as a mixture of unknown Gaussians. The proposed approximation is well-suited for jamming signals of practical interest, i.e. Gaussian or M-QAM interferers and reveals that in certain scenarios it is advantageous to use jamming signals whose statistical structure resembles the data rather than the noise. © 2012 IEEE

    Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches

    Get PDF
    Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures

    Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference

    Get PDF
    Physical-layer network coding (PNC) has been proposed for next generation networks. In this paper, we investigate PNC schemes with embedded perfect secrecy by exploiting structured interference in relay networks with two users and a single relay. In a practical scenario where both users employ finite and uniform signal input distributions, we establish upper bounds (UBs) on the achievable perfect secrecy rates and make these explicit when pulse amplitude modulation modems are used. We then describe two simple, explicit encoders that can achieve perfect secrecy rates close to these UBs with respect to an untrustworthy relay in the single antenna and single relay setting. Last, we generalize our system to a multiple-input multiple-output relay channel, where the relay has more antennas than the users and study optimal precoding matrices, which maintain a required secrecy constraint. Our results establish that the design of PNC transmission schemes with enhanced throughput and guaranteed data confidentiality is feasible in next generation systems

    Protecting Secret Key Generation Systems Against Jamming: Energy Harvesting and Channel Hopping Approaches

    Get PDF
    Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of legitimate nodes and the jammer is formulated as a two-player zero-sum game and the Nash and Stackelberg equilibria are characterized analytically and in closed form. In particular, in the case of EH receivers, the existence of a critical transmission power for the legitimate nodes allows the full characterization of the game's equilibria and also enables the complete neutralization of the jammer. In the case of channel hopping versus power spreading techniques, it is shown that the jammer's optimal strategy is always power spreading while the legitimate nodes should only use power spreading in the high signal-to-interference ratio (SIR) regime. In the low SIR regime, when avoiding the jammer's interference becomes critical, channel hopping is optimal for the legitimate nodes. Numerical results demonstrate the efficiency of both counter-jamming measures

    Teaching old sensors New tricks: archetypes of intelligence

    No full text
    In this paper a generic intelligent sensor software architecture is described which builds upon the basic requirements of related industry standards (IEEE 1451 and SEVA BS- 7986). It incorporates specific functionalities such as real-time fault detection, drift compensation, adaptation to environmental changes and autonomous reconfiguration. The modular based structure of the intelligent sensor architecture provides enhanced flexibility in regard to the choice of specific algorithmic realizations. In this context, the particular aspects of fault detection and drift estimation are discussed. A mixed indicative/corrective fault detection approach is proposed while it is demonstrated that reversible/irreversible state dependent drift can be estimated using generic algorithms such as the EKF or on-line density estimators. Finally, a parsimonious density estimator is presented and validated through simulated and real data for use in an operating regime dependent fault detection framework
    corecore