347 research outputs found
Iterative pre-distortion of the non-linear satellite channel
Digital Video Broadcasting - Satellite - Second Generation (DVB-S2) is the
current European standard for satellite broadcast and broadband communications.
It relies on high order modulations up to 32-amplitude/phase-shift-keying
(APSK) in order to increase the system spectral efficiency. Unfortunately, as
the modulation order increases, the receiver becomes more sensitive to physical
layer impairments, and notably to the distortions induced by the power
amplifier and the channelizing filters aboard the satellite. Pre-distortion of
the non-linear satellite channel has been studied for many years. However, the
performance of existing pre-distortion algorithms generally becomes poor when
high-order modulations are used on a non-linear channel with a long memory. In
this paper, we investigate a new iterative method that pre-distorts blocks of
transmitted symbols so as to minimize the Euclidian distance between the
transmitted and received symbols. We also propose approximations to relax the
pre-distorter complexity while keeping its performance acceptable
Impact of Realistic Propagation Conditions on Reciprocity-Based Secret-Key Capacity
Secret-key generation exploiting the channel reciprocity between two
legitimate parties is an interesting alternative solution to cryptographic
primitives for key distribution in wireless systems as it does not rely on an
access infrastructure and provides information-theoretic security. The large
majority of works in the literature generally assumes that the eavesdropper
gets no side information about the key from her observations provided that (i)
it is spaced more than a wavelength away from a legitimate party and (ii) the
channel is rich enough in scattering. In this paper, we show that this
condition is not always verified in practice and we analyze the secret-key
capacity under realistic propagation conditions
Collisions of uniformly distributed identifiers with an application to MAC address anonymization
The main contribution of this paper consists in theoretical approximations of
the collision rate of random identifiers uniformly distributed in
buckets---along with bounds on the approximation errors. A secondary
contribution is a decentralized anonymization system of media access control
(MAC) addresses with a low collision rate. The main contribution supports the
secondary one in that it quantifies its collision rate, thereby allowing
designers to minimize while attaining specific collision rates. Recent
works in crowd monitoring based on WiFi probe requests, for which collected MAC
addresses should be anonymized, have inspired this research
CSI-based versus RSS-based Secret-Key Generation under Correlated Eavesdropping
Physical-layer security (PLS) has the potential to strongly enhance the
overall system security as an alternative to or in combination with
conventional cryptographic primitives usually implemented at higher network
layers. Secret-key generation relying on wireless channel reciprocity is an
interesting solution as it can be efficiently implemented at the physical layer
of emerging wireless communication networks, while providing
information-theoretic security guarantees. In this paper, we investigate and
compare the secret-key capacity based on the sampling of the entire complex
channel state information (CSI) or only its envelope, the received signal
strength (RSS). Moreover, as opposed to previous works, we take into account
the fact that the eavesdropper's observations might be correlated and we
consider the high signal-to-noise ratio (SNR) regime where we can find simple
analytical expressions for the secret-key capacity. As already found in
previous works, we find that RSS-based secret-key generation is heavily
penalized as compared to CSI-based systems. At high SNR, we are able to
precisely and simply quantify this penalty: a halved pre-log factor and a
constant penalty of about 0.69 bit, which disappears as Eve's channel gets
highly correlated
Deceptive Jamming in WLAN Sensing
Joint Communication and Sensing (JCAS) is taking its first shape in WLAN
sensing under IEEE 802.11bf, where standardized WLAN signals and protocols are
exploited to enable radar-like sensing. However, an overlooked problem in JCAS,
and specifically in WLAN Sensing, is the sensitivity of the system to a
deceptive jammer, which introduces phantom targets to mislead the victim radar
receiver. Standardized waveforms and sensing parameters make the system
vulnerable to physical layer attacks. Moreover, orthogonal frequency-division
multiplexing (OFDM) makes deceptive jamming even easier as it allows digitally
generated artificial range/Doppler maps. This paper studies deceptive jamming
in JCAS, with a special focus on WLAN Sensing. The provided mathematical models
give insights into how to design jamming signals and their impact on the
sensing system. Numerical analyses illustrate various distortions caused by
deceptive jamming, while the experimental results validate the need for
meticulous JCAS design to protect the system against physical layer attacks in
the form of deceptive jamming.Comment: 7 pages, 8 figure
Angle-of-Arrival based localization using polynomial chaos expansions
International audienceIn this paper, polynomial chaos expansions are applied to angle-of-arrival based localization. By using a polynomial chaos expansion on a least squares estimator, a new positioning method is designed. Simulation results show that the proposed method returns precise information about the statistical distribution of the position
- …